diff options
author | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
---|---|---|
committer | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
commit | 5f8de423f190bbb79a62f804151bc24824fa32d8 (patch) | |
tree | 10027f336435511475e392454359edea8e25895d /testing/web-platform/meta/WebCryptoAPI | |
parent | 49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff) | |
download | UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip |
Add m-esr52 at 52.6.0
Diffstat (limited to 'testing/web-platform/meta/WebCryptoAPI')
57 files changed, 62840 insertions, 0 deletions
diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker.js.ini new file mode 100644 index 000000000..2eaf85c94 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker.js.ini @@ -0,0 +1,3 @@ +[ecdh_bits.worker] + type: testharness + expected: TIMEOUT diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker.js.ini new file mode 100644 index 000000000..e762ce09a --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker.js.ini @@ -0,0 +1,3 @@ +[ecdh_keys.worker] + type: testharness + expected: TIMEOUT diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/hkdf.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/hkdf.worker.js.ini new file mode 100644 index 000000000..dbd347aaa --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/hkdf.worker.js.ini @@ -0,0 +1,4867 @@ +[hkdf.worker] + type: testharness + disabled: + if debug and (os == "linux") and (bits == 32): https://bugzilla.mozilla.org/show_bug.cgi?id=1312938 + expected: + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + [short derivedKey, normal salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/pbkdf2.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/pbkdf2.worker.js.ini new file mode 100644 index 000000000..779a4e1d2 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/pbkdf2.worker.js.ini @@ -0,0 +1,30490 @@ +[pbkdf2.worker] + type: testharness + disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1309307 + expected: TIMEOUT + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: FAIL + + [short password, short salt, SHA-384, with 1 iterations with null length] + expected: FAIL + + [short password, short salt, SHA-384, with 1 iterations with 0 length] + expected: FAIL + + [short password, short salt, SHA-384, with 1 iterations with non-multiple of 8 length] + expected: FAIL + + [short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: FAIL + + [short password, short salt, SHA-384, with 1000 iterations with null length] + expected: FAIL + + [short password, short salt, SHA-384, with 1000 iterations with 0 length] + expected: FAIL + + [short password, short salt, SHA-384, with 1000 iterations with non-multiple of 8 length] + expected: FAIL + + [short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-384, with 100000 iterations] + expected: + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 100000 iterations] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 100000 iterations] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 100000 iterations] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-384, with 100000 iterations] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-384, with 100000 iterations] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-384, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-384, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-384, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-384, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-384, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-384, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-384, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-384, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [short password, short salt, SHA-384, with 100000 iterations with null length] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [short password, short salt, SHA-384, with 100000 iterations with 0 length] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [short password, short salt, SHA-384, with 100000 iterations with non-multiple of 8 length] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [short password, short salt, SHA-384, with 100000 iterations with missing deriveBits usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [short password, short salt, SHA-384, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-384, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-384, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-384, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-384, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-384, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-384, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-384, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-384, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-384, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-384, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-384, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-384, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-384, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [short password, short salt, SHA-512, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [short password, short salt, SHA-512, with 1 iterations with null length] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [short password, short salt, SHA-512, with 1 iterations with 0 length] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [short password, short salt, SHA-512, with 1 iterations with non-multiple of 8 length] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [short password, short salt, SHA-512, with 1 iterations with missing deriveBits usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [short password, short salt, SHA-512, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [short password, short salt, SHA-512, with 1000 iterations with null length] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [short password, short salt, SHA-512, with 1000 iterations with 0 length] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [short password, short salt, SHA-512, with 1000 iterations with non-multiple of 8 length] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [short password, short salt, SHA-512, with 1000 iterations with missing deriveBits usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [short password, short salt, SHA-512, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [short password, short salt, SHA-512, with 100000 iterations with null length] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [short password, short salt, SHA-512, with 100000 iterations with 0 length] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [short password, short salt, SHA-512, with 100000 iterations with non-multiple of 8 length] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [short password, short salt, SHA-512, with 100000 iterations with missing deriveBits usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [short password, short salt, SHA-512, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 0 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [short password, short salt, SHA-1, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 1 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [short password, short salt, SHA-1, with 1 iterations with null length] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [short password, short salt, SHA-1, with 1 iterations with 0 length] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [short password, short salt, SHA-1, with 1 iterations with non-multiple of 8 length] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [short password, short salt, SHA-1, with 1 iterations with missing deriveBits usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [short password, short salt, SHA-1, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 1000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [short password, short salt, SHA-1, with 1000 iterations with null length] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [short password, short salt, SHA-1, with 1000 iterations with 0 length] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [short password, short salt, SHA-1, with 1000 iterations with non-multiple of 8 length] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [short password, short salt, SHA-1, with 1000 iterations with missing deriveBits usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [short password, short salt, SHA-1, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 100000 iterations] + expected: + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 100000 iterations] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): PASS + NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): PASS + NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 100000 iterations] + expected: + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, short salt, SHA-1, with 100000 iterations with null length] + expected: NOTRUN + + [short password, short salt, SHA-1, with 100000 iterations with 0 length] + expected: NOTRUN + + [short password, short salt, SHA-1, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [short password, short salt, SHA-1, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [short password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, short salt, SHA-256, with 1 iterations with null length] + expected: NOTRUN + + [short password, short salt, SHA-256, with 1 iterations with 0 length] + expected: NOTRUN + + [short password, short salt, SHA-256, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [short password, short salt, SHA-256, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, short salt, SHA-256, with 1000 iterations with null length] + expected: NOTRUN + + [short password, short salt, SHA-256, with 1000 iterations with 0 length] + expected: NOTRUN + + [short password, short salt, SHA-256, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [short password, short salt, SHA-256, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, short salt, SHA-256, with 100000 iterations with null length] + expected: NOTRUN + + [short password, short salt, SHA-256, with 100000 iterations with 0 length] + expected: NOTRUN + + [short password, short salt, SHA-256, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [short password, short salt, SHA-256, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [short password, short salt, PBKDF2, with 1 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [short password, short salt, PBKDF2, with 1000 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [short password, short salt, PBKDF2, with 100000 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [short password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, long salt, SHA-384, with 1 iterations with null length] + expected: NOTRUN + + [short password, long salt, SHA-384, with 1 iterations with 0 length] + expected: NOTRUN + + [short password, long salt, SHA-384, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [short password, long salt, SHA-384, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, long salt, SHA-384, with 1000 iterations with null length] + expected: NOTRUN + + [short password, long salt, SHA-384, with 1000 iterations with 0 length] + expected: NOTRUN + + [short password, long salt, SHA-384, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [short password, long salt, SHA-384, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, long salt, SHA-384, with 100000 iterations with null length] + expected: NOTRUN + + [short password, long salt, SHA-384, with 100000 iterations with 0 length] + expected: NOTRUN + + [short password, long salt, SHA-384, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [short password, long salt, SHA-384, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [short password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, long salt, SHA-512, with 1 iterations with null length] + expected: NOTRUN + + [short password, long salt, SHA-512, with 1 iterations with 0 length] + expected: NOTRUN + + [short password, long salt, SHA-512, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [short password, long salt, SHA-512, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, long salt, SHA-512, with 1000 iterations with null length] + expected: NOTRUN + + [short password, long salt, SHA-512, with 1000 iterations with 0 length] + expected: NOTRUN + + [short password, long salt, SHA-512, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [short password, long salt, SHA-512, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, long salt, SHA-512, with 100000 iterations with null length] + expected: NOTRUN + + [short password, long salt, SHA-512, with 100000 iterations with 0 length] + expected: NOTRUN + + [short password, long salt, SHA-512, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [short password, long salt, SHA-512, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [short password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, long salt, SHA-1, with 1 iterations with null length] + expected: NOTRUN + + [short password, long salt, SHA-1, with 1 iterations with 0 length] + expected: NOTRUN + + [short password, long salt, SHA-1, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [short password, long salt, SHA-1, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, long salt, SHA-1, with 1000 iterations with null length] + expected: NOTRUN + + [short password, long salt, SHA-1, with 1000 iterations with 0 length] + expected: NOTRUN + + [short password, long salt, SHA-1, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [short password, long salt, SHA-1, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, long salt, SHA-1, with 100000 iterations with null length] + expected: NOTRUN + + [short password, long salt, SHA-1, with 100000 iterations with 0 length] + expected: NOTRUN + + [short password, long salt, SHA-1, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [short password, long salt, SHA-1, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [short password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, long salt, SHA-256, with 1 iterations with null length] + expected: NOTRUN + + [short password, long salt, SHA-256, with 1 iterations with 0 length] + expected: NOTRUN + + [short password, long salt, SHA-256, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [short password, long salt, SHA-256, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, long salt, SHA-256, with 1000 iterations with null length] + expected: NOTRUN + + [short password, long salt, SHA-256, with 1000 iterations with 0 length] + expected: NOTRUN + + [short password, long salt, SHA-256, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [short password, long salt, SHA-256, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, long salt, SHA-256, with 100000 iterations with null length] + expected: NOTRUN + + [short password, long salt, SHA-256, with 100000 iterations with 0 length] + expected: NOTRUN + + [short password, long salt, SHA-256, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [short password, long salt, SHA-256, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [short password, long salt, PBKDF2, with 1 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [short password, long salt, PBKDF2, with 1000 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [short password, long salt, PBKDF2, with 100000 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [short password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, empty salt, SHA-384, with 1 iterations with null length] + expected: NOTRUN + + [short password, empty salt, SHA-384, with 1 iterations with 0 length] + expected: NOTRUN + + [short password, empty salt, SHA-384, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [short password, empty salt, SHA-384, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, empty salt, SHA-384, with 1000 iterations with null length] + expected: NOTRUN + + [short password, empty salt, SHA-384, with 1000 iterations with 0 length] + expected: NOTRUN + + [short password, empty salt, SHA-384, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [short password, empty salt, SHA-384, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, empty salt, SHA-384, with 100000 iterations with null length] + expected: NOTRUN + + [short password, empty salt, SHA-384, with 100000 iterations with 0 length] + expected: NOTRUN + + [short password, empty salt, SHA-384, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [short password, empty salt, SHA-384, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [short password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, empty salt, SHA-512, with 1 iterations with null length] + expected: NOTRUN + + [short password, empty salt, SHA-512, with 1 iterations with 0 length] + expected: NOTRUN + + [short password, empty salt, SHA-512, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [short password, empty salt, SHA-512, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, empty salt, SHA-512, with 1000 iterations with null length] + expected: NOTRUN + + [short password, empty salt, SHA-512, with 1000 iterations with 0 length] + expected: NOTRUN + + [short password, empty salt, SHA-512, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [short password, empty salt, SHA-512, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, empty salt, SHA-512, with 100000 iterations with null length] + expected: NOTRUN + + [short password, empty salt, SHA-512, with 100000 iterations with 0 length] + expected: NOTRUN + + [short password, empty salt, SHA-512, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [short password, empty salt, SHA-512, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [short password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, empty salt, SHA-1, with 1 iterations with null length] + expected: NOTRUN + + [short password, empty salt, SHA-1, with 1 iterations with 0 length] + expected: NOTRUN + + [short password, empty salt, SHA-1, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [short password, empty salt, SHA-1, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, empty salt, SHA-1, with 1000 iterations with null length] + expected: NOTRUN + + [short password, empty salt, SHA-1, with 1000 iterations with 0 length] + expected: NOTRUN + + [short password, empty salt, SHA-1, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [short password, empty salt, SHA-1, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, empty salt, SHA-1, with 100000 iterations with null length] + expected: NOTRUN + + [short password, empty salt, SHA-1, with 100000 iterations with 0 length] + expected: NOTRUN + + [short password, empty salt, SHA-1, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [short password, empty salt, SHA-1, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [short password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, empty salt, SHA-256, with 1 iterations with null length] + expected: NOTRUN + + [short password, empty salt, SHA-256, with 1 iterations with 0 length] + expected: NOTRUN + + [short password, empty salt, SHA-256, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [short password, empty salt, SHA-256, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, empty salt, SHA-256, with 1000 iterations with null length] + expected: NOTRUN + + [short password, empty salt, SHA-256, with 1000 iterations with 0 length] + expected: NOTRUN + + [short password, empty salt, SHA-256, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [short password, empty salt, SHA-256, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, empty salt, SHA-256, with 100000 iterations with null length] + expected: NOTRUN + + [short password, empty salt, SHA-256, with 100000 iterations with 0 length] + expected: NOTRUN + + [short password, empty salt, SHA-256, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [short password, empty salt, SHA-256, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [short password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [short password, empty salt, PBKDF2, with 1 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [short password, empty salt, PBKDF2, with 1000 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [short password, empty salt, PBKDF2, with 100000 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using short password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using short password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using short password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using short password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using short password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using short password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using short password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using short password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using short password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using short password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using short password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using short password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [long password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, short salt, SHA-384, with 1 iterations with null length] + expected: NOTRUN + + [long password, short salt, SHA-384, with 1 iterations with 0 length] + expected: NOTRUN + + [long password, short salt, SHA-384, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [long password, short salt, SHA-384, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, short salt, SHA-384, with 1000 iterations with null length] + expected: NOTRUN + + [long password, short salt, SHA-384, with 1000 iterations with 0 length] + expected: NOTRUN + + [long password, short salt, SHA-384, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [long password, short salt, SHA-384, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, short salt, SHA-384, with 100000 iterations with null length] + expected: NOTRUN + + [long password, short salt, SHA-384, with 100000 iterations with 0 length] + expected: NOTRUN + + [long password, short salt, SHA-384, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [long password, short salt, SHA-384, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [long password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, short salt, SHA-512, with 1 iterations with null length] + expected: NOTRUN + + [long password, short salt, SHA-512, with 1 iterations with 0 length] + expected: NOTRUN + + [long password, short salt, SHA-512, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [long password, short salt, SHA-512, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, short salt, SHA-512, with 1000 iterations with null length] + expected: NOTRUN + + [long password, short salt, SHA-512, with 1000 iterations with 0 length] + expected: NOTRUN + + [long password, short salt, SHA-512, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [long password, short salt, SHA-512, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, short salt, SHA-512, with 100000 iterations with null length] + expected: NOTRUN + + [long password, short salt, SHA-512, with 100000 iterations with 0 length] + expected: NOTRUN + + [long password, short salt, SHA-512, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [long password, short salt, SHA-512, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [long password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, short salt, SHA-1, with 1 iterations with null length] + expected: NOTRUN + + [long password, short salt, SHA-1, with 1 iterations with 0 length] + expected: NOTRUN + + [long password, short salt, SHA-1, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [long password, short salt, SHA-1, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, short salt, SHA-1, with 1000 iterations with null length] + expected: NOTRUN + + [long password, short salt, SHA-1, with 1000 iterations with 0 length] + expected: NOTRUN + + [long password, short salt, SHA-1, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [long password, short salt, SHA-1, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, short salt, SHA-1, with 100000 iterations with null length] + expected: NOTRUN + + [long password, short salt, SHA-1, with 100000 iterations with 0 length] + expected: NOTRUN + + [long password, short salt, SHA-1, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [long password, short salt, SHA-1, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [long password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, short salt, SHA-256, with 1 iterations with null length] + expected: NOTRUN + + [long password, short salt, SHA-256, with 1 iterations with 0 length] + expected: NOTRUN + + [long password, short salt, SHA-256, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [long password, short salt, SHA-256, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, short salt, SHA-256, with 1000 iterations with null length] + expected: NOTRUN + + [long password, short salt, SHA-256, with 1000 iterations with 0 length] + expected: NOTRUN + + [long password, short salt, SHA-256, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [long password, short salt, SHA-256, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, short salt, SHA-256, with 100000 iterations with null length] + expected: NOTRUN + + [long password, short salt, SHA-256, with 100000 iterations with 0 length] + expected: NOTRUN + + [long password, short salt, SHA-256, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [long password, short salt, SHA-256, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [long password, short salt, PBKDF2, with 1 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [long password, short salt, PBKDF2, with 1000 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [long password, short salt, PBKDF2, with 100000 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [long password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, long salt, SHA-384, with 1 iterations with null length] + expected: NOTRUN + + [long password, long salt, SHA-384, with 1 iterations with 0 length] + expected: NOTRUN + + [long password, long salt, SHA-384, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [long password, long salt, SHA-384, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, long salt, SHA-384, with 1000 iterations with null length] + expected: NOTRUN + + [long password, long salt, SHA-384, with 1000 iterations with 0 length] + expected: NOTRUN + + [long password, long salt, SHA-384, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [long password, long salt, SHA-384, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, long salt, SHA-384, with 100000 iterations with null length] + expected: NOTRUN + + [long password, long salt, SHA-384, with 100000 iterations with 0 length] + expected: NOTRUN + + [long password, long salt, SHA-384, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [long password, long salt, SHA-384, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [long password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, long salt, SHA-512, with 1 iterations with null length] + expected: NOTRUN + + [long password, long salt, SHA-512, with 1 iterations with 0 length] + expected: NOTRUN + + [long password, long salt, SHA-512, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [long password, long salt, SHA-512, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, long salt, SHA-512, with 1000 iterations with null length] + expected: NOTRUN + + [long password, long salt, SHA-512, with 1000 iterations with 0 length] + expected: NOTRUN + + [long password, long salt, SHA-512, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [long password, long salt, SHA-512, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, long salt, SHA-512, with 100000 iterations with null length] + expected: NOTRUN + + [long password, long salt, SHA-512, with 100000 iterations with 0 length] + expected: NOTRUN + + [long password, long salt, SHA-512, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [long password, long salt, SHA-512, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [long password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, long salt, SHA-1, with 1 iterations with null length] + expected: NOTRUN + + [long password, long salt, SHA-1, with 1 iterations with 0 length] + expected: NOTRUN + + [long password, long salt, SHA-1, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [long password, long salt, SHA-1, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, long salt, SHA-1, with 1000 iterations with null length] + expected: NOTRUN + + [long password, long salt, SHA-1, with 1000 iterations with 0 length] + expected: NOTRUN + + [long password, long salt, SHA-1, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [long password, long salt, SHA-1, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, long salt, SHA-1, with 100000 iterations with null length] + expected: NOTRUN + + [long password, long salt, SHA-1, with 100000 iterations with 0 length] + expected: NOTRUN + + [long password, long salt, SHA-1, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [long password, long salt, SHA-1, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [long password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, long salt, SHA-256, with 1 iterations with null length] + expected: NOTRUN + + [long password, long salt, SHA-256, with 1 iterations with 0 length] + expected: NOTRUN + + [long password, long salt, SHA-256, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [long password, long salt, SHA-256, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, long salt, SHA-256, with 1000 iterations with null length] + expected: NOTRUN + + [long password, long salt, SHA-256, with 1000 iterations with 0 length] + expected: NOTRUN + + [long password, long salt, SHA-256, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [long password, long salt, SHA-256, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, long salt, SHA-256, with 100000 iterations with null length] + expected: NOTRUN + + [long password, long salt, SHA-256, with 100000 iterations with 0 length] + expected: NOTRUN + + [long password, long salt, SHA-256, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [long password, long salt, SHA-256, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [long password, long salt, PBKDF2, with 1 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [long password, long salt, PBKDF2, with 1000 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [long password, long salt, PBKDF2, with 100000 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [long password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, empty salt, SHA-384, with 1 iterations with null length] + expected: NOTRUN + + [long password, empty salt, SHA-384, with 1 iterations with 0 length] + expected: NOTRUN + + [long password, empty salt, SHA-384, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [long password, empty salt, SHA-384, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, empty salt, SHA-384, with 1000 iterations with null length] + expected: NOTRUN + + [long password, empty salt, SHA-384, with 1000 iterations with 0 length] + expected: NOTRUN + + [long password, empty salt, SHA-384, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [long password, empty salt, SHA-384, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, empty salt, SHA-384, with 100000 iterations with null length] + expected: NOTRUN + + [long password, empty salt, SHA-384, with 100000 iterations with 0 length] + expected: NOTRUN + + [long password, empty salt, SHA-384, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [long password, empty salt, SHA-384, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [long password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, empty salt, SHA-512, with 1 iterations with null length] + expected: NOTRUN + + [long password, empty salt, SHA-512, with 1 iterations with 0 length] + expected: NOTRUN + + [long password, empty salt, SHA-512, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [long password, empty salt, SHA-512, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, empty salt, SHA-512, with 1000 iterations with null length] + expected: NOTRUN + + [long password, empty salt, SHA-512, with 1000 iterations with 0 length] + expected: NOTRUN + + [long password, empty salt, SHA-512, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [long password, empty salt, SHA-512, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, empty salt, SHA-512, with 100000 iterations with null length] + expected: NOTRUN + + [long password, empty salt, SHA-512, with 100000 iterations with 0 length] + expected: NOTRUN + + [long password, empty salt, SHA-512, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [long password, empty salt, SHA-512, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [long password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, empty salt, SHA-1, with 1 iterations with null length] + expected: NOTRUN + + [long password, empty salt, SHA-1, with 1 iterations with 0 length] + expected: NOTRUN + + [long password, empty salt, SHA-1, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [long password, empty salt, SHA-1, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, empty salt, SHA-1, with 1000 iterations with null length] + expected: NOTRUN + + [long password, empty salt, SHA-1, with 1000 iterations with 0 length] + expected: NOTRUN + + [long password, empty salt, SHA-1, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [long password, empty salt, SHA-1, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, empty salt, SHA-1, with 100000 iterations with null length] + expected: NOTRUN + + [long password, empty salt, SHA-1, with 100000 iterations with 0 length] + expected: NOTRUN + + [long password, empty salt, SHA-1, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [long password, empty salt, SHA-1, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [long password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, empty salt, SHA-256, with 1 iterations with null length] + expected: NOTRUN + + [long password, empty salt, SHA-256, with 1 iterations with 0 length] + expected: NOTRUN + + [long password, empty salt, SHA-256, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [long password, empty salt, SHA-256, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, empty salt, SHA-256, with 1000 iterations with null length] + expected: NOTRUN + + [long password, empty salt, SHA-256, with 1000 iterations with 0 length] + expected: NOTRUN + + [long password, empty salt, SHA-256, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [long password, empty salt, SHA-256, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, empty salt, SHA-256, with 100000 iterations with null length] + expected: NOTRUN + + [long password, empty salt, SHA-256, with 100000 iterations with 0 length] + expected: NOTRUN + + [long password, empty salt, SHA-256, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [long password, empty salt, SHA-256, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [long password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [long password, empty salt, PBKDF2, with 1 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [long password, empty salt, PBKDF2, with 1000 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [long password, empty salt, PBKDF2, with 100000 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using long password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using long password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using long password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using long password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using long password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using long password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using long password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using long password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using long password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using long password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using long password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using long password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [empty password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, short salt, SHA-384, with 1 iterations with null length] + expected: NOTRUN + + [empty password, short salt, SHA-384, with 1 iterations with 0 length] + expected: NOTRUN + + [empty password, short salt, SHA-384, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [empty password, short salt, SHA-384, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, short salt, SHA-384, with 1000 iterations with null length] + expected: NOTRUN + + [empty password, short salt, SHA-384, with 1000 iterations with 0 length] + expected: NOTRUN + + [empty password, short salt, SHA-384, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [empty password, short salt, SHA-384, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, short salt, SHA-384, with 100000 iterations with null length] + expected: NOTRUN + + [empty password, short salt, SHA-384, with 100000 iterations with 0 length] + expected: NOTRUN + + [empty password, short salt, SHA-384, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [empty password, short salt, SHA-384, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [empty password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, short salt, SHA-512, with 1 iterations with null length] + expected: NOTRUN + + [empty password, short salt, SHA-512, with 1 iterations with 0 length] + expected: NOTRUN + + [empty password, short salt, SHA-512, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [empty password, short salt, SHA-512, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, short salt, SHA-512, with 1000 iterations with null length] + expected: NOTRUN + + [empty password, short salt, SHA-512, with 1000 iterations with 0 length] + expected: NOTRUN + + [empty password, short salt, SHA-512, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [empty password, short salt, SHA-512, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, short salt, SHA-512, with 100000 iterations with null length] + expected: NOTRUN + + [empty password, short salt, SHA-512, with 100000 iterations with 0 length] + expected: NOTRUN + + [empty password, short salt, SHA-512, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [empty password, short salt, SHA-512, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [empty password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, short salt, SHA-1, with 1 iterations with null length] + expected: NOTRUN + + [empty password, short salt, SHA-1, with 1 iterations with 0 length] + expected: NOTRUN + + [empty password, short salt, SHA-1, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [empty password, short salt, SHA-1, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, short salt, SHA-1, with 1000 iterations with null length] + expected: NOTRUN + + [empty password, short salt, SHA-1, with 1000 iterations with 0 length] + expected: NOTRUN + + [empty password, short salt, SHA-1, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [empty password, short salt, SHA-1, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, short salt, SHA-1, with 100000 iterations with null length] + expected: NOTRUN + + [empty password, short salt, SHA-1, with 100000 iterations with 0 length] + expected: NOTRUN + + [empty password, short salt, SHA-1, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [empty password, short salt, SHA-1, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [empty password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, short salt, SHA-256, with 1 iterations with null length] + expected: NOTRUN + + [empty password, short salt, SHA-256, with 1 iterations with 0 length] + expected: NOTRUN + + [empty password, short salt, SHA-256, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [empty password, short salt, SHA-256, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, short salt, SHA-256, with 1000 iterations with null length] + expected: NOTRUN + + [empty password, short salt, SHA-256, with 1000 iterations with 0 length] + expected: NOTRUN + + [empty password, short salt, SHA-256, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [empty password, short salt, SHA-256, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, short salt, SHA-256, with 100000 iterations with null length] + expected: NOTRUN + + [empty password, short salt, SHA-256, with 100000 iterations with 0 length] + expected: NOTRUN + + [empty password, short salt, SHA-256, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [empty password, short salt, SHA-256, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [empty password, short salt, PBKDF2, with 1 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [empty password, short salt, PBKDF2, with 1000 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [empty password, short salt, PBKDF2, with 100000 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [empty password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, long salt, SHA-384, with 1 iterations with null length] + expected: NOTRUN + + [empty password, long salt, SHA-384, with 1 iterations with 0 length] + expected: NOTRUN + + [empty password, long salt, SHA-384, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [empty password, long salt, SHA-384, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, long salt, SHA-384, with 1000 iterations with null length] + expected: NOTRUN + + [empty password, long salt, SHA-384, with 1000 iterations with 0 length] + expected: NOTRUN + + [empty password, long salt, SHA-384, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [empty password, long salt, SHA-384, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, long salt, SHA-384, with 100000 iterations with null length] + expected: NOTRUN + + [empty password, long salt, SHA-384, with 100000 iterations with 0 length] + expected: NOTRUN + + [empty password, long salt, SHA-384, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [empty password, long salt, SHA-384, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [empty password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, long salt, SHA-512, with 1 iterations with null length] + expected: NOTRUN + + [empty password, long salt, SHA-512, with 1 iterations with 0 length] + expected: NOTRUN + + [empty password, long salt, SHA-512, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [empty password, long salt, SHA-512, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, long salt, SHA-512, with 1000 iterations with null length] + expected: NOTRUN + + [empty password, long salt, SHA-512, with 1000 iterations with 0 length] + expected: NOTRUN + + [empty password, long salt, SHA-512, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [empty password, long salt, SHA-512, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, long salt, SHA-512, with 100000 iterations with null length] + expected: NOTRUN + + [empty password, long salt, SHA-512, with 100000 iterations with 0 length] + expected: NOTRUN + + [empty password, long salt, SHA-512, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [empty password, long salt, SHA-512, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [empty password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, long salt, SHA-1, with 1 iterations with null length] + expected: NOTRUN + + [empty password, long salt, SHA-1, with 1 iterations with 0 length] + expected: NOTRUN + + [empty password, long salt, SHA-1, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [empty password, long salt, SHA-1, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, long salt, SHA-1, with 1000 iterations with null length] + expected: NOTRUN + + [empty password, long salt, SHA-1, with 1000 iterations with 0 length] + expected: NOTRUN + + [empty password, long salt, SHA-1, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [empty password, long salt, SHA-1, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, long salt, SHA-1, with 100000 iterations with null length] + expected: NOTRUN + + [empty password, long salt, SHA-1, with 100000 iterations with 0 length] + expected: NOTRUN + + [empty password, long salt, SHA-1, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [empty password, long salt, SHA-1, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [empty password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, long salt, SHA-256, with 1 iterations with null length] + expected: NOTRUN + + [empty password, long salt, SHA-256, with 1 iterations with 0 length] + expected: NOTRUN + + [empty password, long salt, SHA-256, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [empty password, long salt, SHA-256, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, long salt, SHA-256, with 1000 iterations with null length] + expected: NOTRUN + + [empty password, long salt, SHA-256, with 1000 iterations with 0 length] + expected: NOTRUN + + [empty password, long salt, SHA-256, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [empty password, long salt, SHA-256, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, long salt, SHA-256, with 100000 iterations with null length] + expected: NOTRUN + + [empty password, long salt, SHA-256, with 100000 iterations with 0 length] + expected: NOTRUN + + [empty password, long salt, SHA-256, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [empty password, long salt, SHA-256, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [empty password, long salt, PBKDF2, with 1 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [empty password, long salt, PBKDF2, with 1000 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [empty password, long salt, PBKDF2, with 100000 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [empty password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, empty salt, SHA-384, with 1 iterations with null length] + expected: NOTRUN + + [empty password, empty salt, SHA-384, with 1 iterations with 0 length] + expected: NOTRUN + + [empty password, empty salt, SHA-384, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384] + expected: NOTRUN + + [empty password, empty salt, SHA-384, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, empty salt, SHA-384, with 1000 iterations with null length] + expected: NOTRUN + + [empty password, empty salt, SHA-384, with 1000 iterations with 0 length] + expected: NOTRUN + + [empty password, empty salt, SHA-384, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384] + expected: NOTRUN + + [empty password, empty salt, SHA-384, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, empty salt, SHA-384, with 100000 iterations with null length] + expected: NOTRUN + + [empty password, empty salt, SHA-384, with 100000 iterations with 0 length] + expected: NOTRUN + + [empty password, empty salt, SHA-384, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384] + expected: NOTRUN + + [empty password, empty salt, SHA-384, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 0 iterations] + expected: NOTRUN + + [empty password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, empty salt, SHA-512, with 1 iterations with null length] + expected: NOTRUN + + [empty password, empty salt, SHA-512, with 1 iterations with 0 length] + expected: NOTRUN + + [empty password, empty salt, SHA-512, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512] + expected: NOTRUN + + [empty password, empty salt, SHA-512, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, empty salt, SHA-512, with 1000 iterations with null length] + expected: NOTRUN + + [empty password, empty salt, SHA-512, with 1000 iterations with 0 length] + expected: NOTRUN + + [empty password, empty salt, SHA-512, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512] + expected: NOTRUN + + [empty password, empty salt, SHA-512, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, empty salt, SHA-512, with 100000 iterations with null length] + expected: NOTRUN + + [empty password, empty salt, SHA-512, with 100000 iterations with 0 length] + expected: NOTRUN + + [empty password, empty salt, SHA-512, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512] + expected: NOTRUN + + [empty password, empty salt, SHA-512, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 0 iterations] + expected: NOTRUN + + [empty password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, empty salt, SHA-1, with 1 iterations with null length] + expected: NOTRUN + + [empty password, empty salt, SHA-1, with 1 iterations with 0 length] + expected: NOTRUN + + [empty password, empty salt, SHA-1, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1] + expected: NOTRUN + + [empty password, empty salt, SHA-1, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, empty salt, SHA-1, with 1000 iterations with null length] + expected: NOTRUN + + [empty password, empty salt, SHA-1, with 1000 iterations with 0 length] + expected: NOTRUN + + [empty password, empty salt, SHA-1, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1] + expected: NOTRUN + + [empty password, empty salt, SHA-1, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, empty salt, SHA-1, with 100000 iterations with null length] + expected: NOTRUN + + [empty password, empty salt, SHA-1, with 100000 iterations with 0 length] + expected: NOTRUN + + [empty password, empty salt, SHA-1, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1] + expected: NOTRUN + + [empty password, empty salt, SHA-1, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 0 iterations] + expected: NOTRUN + + [empty password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, empty salt, SHA-256, with 1 iterations with null length] + expected: NOTRUN + + [empty password, empty salt, SHA-256, with 1 iterations with 0 length] + expected: NOTRUN + + [empty password, empty salt, SHA-256, with 1 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256] + expected: NOTRUN + + [empty password, empty salt, SHA-256, with 1 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, empty salt, SHA-256, with 1000 iterations with null length] + expected: NOTRUN + + [empty password, empty salt, SHA-256, with 1000 iterations with 0 length] + expected: NOTRUN + + [empty password, empty salt, SHA-256, with 1000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256] + expected: NOTRUN + + [empty password, empty salt, SHA-256, with 1000 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, empty salt, SHA-256, with 100000 iterations with null length] + expected: NOTRUN + + [empty password, empty salt, SHA-256, with 100000 iterations with 0 length] + expected: NOTRUN + + [empty password, empty salt, SHA-256, with 100000 iterations with non-multiple of 8 length] + expected: NOTRUN + + [empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256] + expected: NOTRUN + + [empty password, empty salt, SHA-256, with 100000 iterations with missing deriveBits usage] + expected: NOTRUN + + [empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key] + expected: NOTRUN + + [empty password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 0 iterations] + expected: NOTRUN + + [empty password, empty salt, PBKDF2, with 1 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, PBKDF2, with 1 iterations] + expected: NOTRUN + + [empty password, empty salt, PBKDF2, with 1000 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, PBKDF2, with 1000 iterations] + expected: NOTRUN + + [empty password, empty salt, PBKDF2, with 100000 iterations with non-digest algorithm PBKDF2] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 128 using empty password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 192 using empty password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: AES-KW length: 256 using empty password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, PBKDF2, with 100000 iterations] + expected: NOTRUN + diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html.ini new file mode 100644 index 000000000..28df3c421 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html.ini @@ -0,0 +1,3 @@ +[test_ecdh_bits.html] + type: testharness + expected: TIMEOUT diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html.ini new file mode 100644 index 000000000..2edfc5ccd --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html.ini @@ -0,0 +1,3 @@ +[test_ecdh_keys.html] + type: testharness + expected: TIMEOUT diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_hkdf.html.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_hkdf.html.ini new file mode 100644 index 000000000..d3ed7db1a --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_hkdf.html.ini @@ -0,0 +1,4862 @@ +[test_hkdf.html] + type: testharness + [short derivedKey, normal salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_pbkdf2.html.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_pbkdf2.html.ini new file mode 100644 index 000000000..cfcbd197f --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_pbkdf2.html.ini @@ -0,0 +1,3 @@ +[test_pbkdf2.html] + disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1309307 + type: testharness diff --git a/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_cbc.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_cbc.worker.js.ini new file mode 100644 index 000000000..2c9804d86 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_cbc.worker.js.ini @@ -0,0 +1,38 @@ +[aes_cbc.worker] + type: testharness + [AES-CBC 128-bit key, 64-bit IV] + expected: FAIL + + [AES-CBC 128-bit key, 192-bit IV] + expected: FAIL + + [AES-CBC 192-bit key, 64-bit IV] + expected: FAIL + + [AES-CBC 192-bit key, 192-bit IV] + expected: FAIL + + [AES-CBC 256-bit key, 64-bit IV] + expected: FAIL + + [AES-CBC 256-bit key, 192-bit IV] + expected: FAIL + + [AES-CBC 128-bit key, 64-bit IV decryption] + expected: FAIL + + [AES-CBC 128-bit key, 192-bit IV decryption] + expected: FAIL + + [AES-CBC 192-bit key, 64-bit IV decryption] + expected: FAIL + + [AES-CBC 192-bit key, 192-bit IV decryption] + expected: FAIL + + [AES-CBC 256-bit key, 64-bit IV decryption] + expected: FAIL + + [AES-CBC 256-bit key, 192-bit IV decryption] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.worker.js.ini new file mode 100644 index 000000000..3daccbeb1 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.worker.js.ini @@ -0,0 +1,110 @@ +[aes_gcm.worker] + type: testharness + [AES-GCM 128-bit key, illegal tag length 24-bits] + expected: FAIL + + [AES-GCM 128-bit key, illegal tag length 48-bits] + expected: FAIL + + [AES-GCM 128-bit key, illegal tag length 72-bits] + expected: FAIL + + [AES-GCM 128-bit key, illegal tag length 95-bits] + expected: FAIL + + [AES-GCM 128-bit key, illegal tag length 129-bits] + expected: FAIL + + [AES-GCM 128-bit key, illegal tag length 256-bits] + expected: FAIL + + [AES-GCM 192-bit key, illegal tag length 24-bits] + expected: FAIL + + [AES-GCM 192-bit key, illegal tag length 48-bits] + expected: FAIL + + [AES-GCM 192-bit key, illegal tag length 72-bits] + expected: FAIL + + [AES-GCM 192-bit key, illegal tag length 95-bits] + expected: FAIL + + [AES-GCM 192-bit key, illegal tag length 129-bits] + expected: FAIL + + [AES-GCM 192-bit key, illegal tag length 256-bits] + expected: FAIL + + [AES-GCM 256-bit key, illegal tag length 24-bits] + expected: FAIL + + [AES-GCM 256-bit key, illegal tag length 48-bits] + expected: FAIL + + [AES-GCM 256-bit key, illegal tag length 72-bits] + expected: FAIL + + [AES-GCM 256-bit key, illegal tag length 95-bits] + expected: FAIL + + [AES-GCM 256-bit key, illegal tag length 129-bits] + expected: FAIL + + [AES-GCM 256-bit key, illegal tag length 256-bits] + expected: FAIL + + [AES-GCM 128-bit key, illegal tag length 24-bits decryption] + expected: FAIL + + [AES-GCM 128-bit key, illegal tag length 48-bits decryption] + expected: FAIL + + [AES-GCM 128-bit key, illegal tag length 72-bits decryption] + expected: FAIL + + [AES-GCM 128-bit key, illegal tag length 95-bits decryption] + expected: FAIL + + [AES-GCM 128-bit key, illegal tag length 129-bits decryption] + expected: FAIL + + [AES-GCM 128-bit key, illegal tag length 256-bits decryption] + expected: FAIL + + [AES-GCM 192-bit key, illegal tag length 24-bits decryption] + expected: FAIL + + [AES-GCM 192-bit key, illegal tag length 48-bits decryption] + expected: FAIL + + [AES-GCM 192-bit key, illegal tag length 72-bits decryption] + expected: FAIL + + [AES-GCM 192-bit key, illegal tag length 95-bits decryption] + expected: FAIL + + [AES-GCM 192-bit key, illegal tag length 129-bits decryption] + expected: FAIL + + [AES-GCM 192-bit key, illegal tag length 256-bits decryption] + expected: FAIL + + [AES-GCM 256-bit key, illegal tag length 24-bits decryption] + expected: FAIL + + [AES-GCM 256-bit key, illegal tag length 48-bits decryption] + expected: FAIL + + [AES-GCM 256-bit key, illegal tag length 72-bits decryption] + expected: FAIL + + [AES-GCM 256-bit key, illegal tag length 95-bits decryption] + expected: FAIL + + [AES-GCM 256-bit key, illegal tag length 129-bits decryption] + expected: FAIL + + [AES-GCM 256-bit key, illegal tag length 256-bits decryption] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/test_aes_cbc.html.ini b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/test_aes_cbc.html.ini new file mode 100644 index 000000000..1e95676ec --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/test_aes_cbc.html.ini @@ -0,0 +1,38 @@ +[test_aes_cbc.html] + type: testharness + [AES-CBC 128-bit key, 64-bit IV] + expected: FAIL + + [AES-CBC 128-bit key, 192-bit IV] + expected: FAIL + + [AES-CBC 192-bit key, 64-bit IV] + expected: FAIL + + [AES-CBC 192-bit key, 192-bit IV] + expected: FAIL + + [AES-CBC 256-bit key, 64-bit IV] + expected: FAIL + + [AES-CBC 256-bit key, 192-bit IV] + expected: FAIL + + [AES-CBC 128-bit key, 64-bit IV decryption] + expected: FAIL + + [AES-CBC 128-bit key, 192-bit IV decryption] + expected: FAIL + + [AES-CBC 192-bit key, 64-bit IV decryption] + expected: FAIL + + [AES-CBC 192-bit key, 192-bit IV decryption] + expected: FAIL + + [AES-CBC 256-bit key, 64-bit IV decryption] + expected: FAIL + + [AES-CBC 256-bit key, 192-bit IV decryption] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/test_aes_gcm.html.ini b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/test_aes_gcm.html.ini new file mode 100644 index 000000000..1e7752bc3 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/test_aes_gcm.html.ini @@ -0,0 +1,110 @@ +[test_aes_gcm.html] + type: testharness + [AES-GCM 128-bit key, illegal tag length 24-bits] + expected: FAIL + + [AES-GCM 128-bit key, illegal tag length 48-bits] + expected: FAIL + + [AES-GCM 128-bit key, illegal tag length 72-bits] + expected: FAIL + + [AES-GCM 128-bit key, illegal tag length 95-bits] + expected: FAIL + + [AES-GCM 128-bit key, illegal tag length 129-bits] + expected: FAIL + + [AES-GCM 128-bit key, illegal tag length 256-bits] + expected: FAIL + + [AES-GCM 192-bit key, illegal tag length 24-bits] + expected: FAIL + + [AES-GCM 192-bit key, illegal tag length 48-bits] + expected: FAIL + + [AES-GCM 192-bit key, illegal tag length 72-bits] + expected: FAIL + + [AES-GCM 192-bit key, illegal tag length 95-bits] + expected: FAIL + + [AES-GCM 192-bit key, illegal tag length 129-bits] + expected: FAIL + + [AES-GCM 192-bit key, illegal tag length 256-bits] + expected: FAIL + + [AES-GCM 256-bit key, illegal tag length 24-bits] + expected: FAIL + + [AES-GCM 256-bit key, illegal tag length 48-bits] + expected: FAIL + + [AES-GCM 256-bit key, illegal tag length 72-bits] + expected: FAIL + + [AES-GCM 256-bit key, illegal tag length 95-bits] + expected: FAIL + + [AES-GCM 256-bit key, illegal tag length 129-bits] + expected: FAIL + + [AES-GCM 256-bit key, illegal tag length 256-bits] + expected: FAIL + + [AES-GCM 128-bit key, illegal tag length 24-bits decryption] + expected: FAIL + + [AES-GCM 128-bit key, illegal tag length 48-bits decryption] + expected: FAIL + + [AES-GCM 128-bit key, illegal tag length 72-bits decryption] + expected: FAIL + + [AES-GCM 128-bit key, illegal tag length 95-bits decryption] + expected: FAIL + + [AES-GCM 128-bit key, illegal tag length 129-bits decryption] + expected: FAIL + + [AES-GCM 128-bit key, illegal tag length 256-bits decryption] + expected: FAIL + + [AES-GCM 192-bit key, illegal tag length 24-bits decryption] + expected: FAIL + + [AES-GCM 192-bit key, illegal tag length 48-bits decryption] + expected: FAIL + + [AES-GCM 192-bit key, illegal tag length 72-bits decryption] + expected: FAIL + + [AES-GCM 192-bit key, illegal tag length 95-bits decryption] + expected: FAIL + + [AES-GCM 192-bit key, illegal tag length 129-bits decryption] + expected: FAIL + + [AES-GCM 192-bit key, illegal tag length 256-bits decryption] + expected: FAIL + + [AES-GCM 256-bit key, illegal tag length 24-bits decryption] + expected: FAIL + + [AES-GCM 256-bit key, illegal tag length 48-bits decryption] + expected: FAIL + + [AES-GCM 256-bit key, illegal tag length 72-bits decryption] + expected: FAIL + + [AES-GCM 256-bit key, illegal tag length 95-bits decryption] + expected: FAIL + + [AES-GCM 256-bit key, illegal tag length 129-bits decryption] + expected: FAIL + + [AES-GCM 256-bit key, illegal tag length 256-bits decryption] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures.worker.js.ini new file mode 100644 index 000000000..1e4aabbea --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures.worker.js.ini @@ -0,0 +1,3 @@ +[failures.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CBC.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CBC.worker.js.ini new file mode 100644 index 000000000..7b3310b78 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CBC.worker.js.ini @@ -0,0 +1,3 @@ +[failures_AES-CBC.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.worker.js.ini new file mode 100644 index 000000000..472b09dd1 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.worker.js.ini @@ -0,0 +1,3 @@ +[failures_AES-CTR.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.worker.js.ini new file mode 100644 index 000000000..64e9f58f0 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.worker.js.ini @@ -0,0 +1,3 @@ +[failures_AES-GCM.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.worker.js.ini new file mode 100644 index 000000000..96031ce55 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.worker.js.ini @@ -0,0 +1,3 @@ +[failures_AES-KW.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.worker.js.ini new file mode 100644 index 000000000..49ab62829 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.worker.js.ini @@ -0,0 +1,3 @@ +[failures_ECDH.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.worker.js.ini new file mode 100644 index 000000000..2fd250f45 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.worker.js.ini @@ -0,0 +1,3 @@ +[failures_ECDSA.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.worker.js.ini new file mode 100644 index 000000000..411ecbdda --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.worker.js.ini @@ -0,0 +1,3 @@ +[failures_HMAC.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.worker.js.ini new file mode 100644 index 000000000..3ec9c3c53 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.worker.js.ini @@ -0,0 +1,3 @@ +[failures_RSA-OAEP.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.worker.js.ini new file mode 100644 index 000000000..7b28b2c04 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.worker.js.ini @@ -0,0 +1,3 @@ +[failures_RSA-PSS.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.worker.js.ini new file mode 100644 index 000000000..5cb45ae09 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.worker.js.ini @@ -0,0 +1,3 @@ +[failures_RSASSA-PKCS1-v1_5.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes.worker.js.ini new file mode 100644 index 000000000..f3a7d610c --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes.worker.js.ini @@ -0,0 +1,3 @@ +[successes.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.worker.js.ini new file mode 100644 index 000000000..e9a9e303a --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.worker.js.ini @@ -0,0 +1,3 @@ +[successes_AES-CBC.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.worker.js.ini new file mode 100644 index 000000000..dcf7febaf --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.worker.js.ini @@ -0,0 +1,3 @@ +[successes_AES-CTR.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.worker.js.ini new file mode 100644 index 000000000..4b949a1b4 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.worker.js.ini @@ -0,0 +1,3 @@ +[successes_AES-GCM.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.worker.js.ini new file mode 100644 index 000000000..5efa92cfc --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.worker.js.ini @@ -0,0 +1,3 @@ +[successes_AES-KW.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.worker.js.ini new file mode 100644 index 000000000..42eac719d --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.worker.js.ini @@ -0,0 +1,3 @@ +[successes_ECDH.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.worker.js.ini new file mode 100644 index 000000000..0d73e197c --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.worker.js.ini @@ -0,0 +1,3 @@ +[successes_ECDSA.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.worker.js.ini new file mode 100644 index 000000000..84b2544fd --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.worker.js.ini @@ -0,0 +1,3 @@ +[successes_HMAC.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.worker.js.ini new file mode 100644 index 000000000..f4e683fa2 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.worker.js.ini @@ -0,0 +1,3 @@ +[successes_RSA-OAEP.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.worker.js.ini new file mode 100644 index 000000000..76a093185 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.worker.js.ini @@ -0,0 +1,3 @@ +[successes_RSA-PSS.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.worker.js.ini new file mode 100644 index 000000000..95acb89f6 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.worker.js.ini @@ -0,0 +1,3 @@ +[successes_RSASSA-PKCS1-v1_5.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures.html.ini new file mode 100644 index 000000000..7cde862f5 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures.html.ini @@ -0,0 +1,3 @@ +[test_failures.html] + type: testharness + disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799 diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-CBC.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-CBC.html.ini new file mode 100644 index 000000000..d5c9d05cc --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-CBC.html.ini @@ -0,0 +1,2216 @@ +[test_failures_AES-CBC.html] + type: testharness + [Bad algorithm: generateKey(AES, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Empty usages: generateKey({length: 128, name: AES-CBC}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 128, name: AES-CBC}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 192, name: AES-CBC}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 192, name: AES-CBC}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 256, name: AES-CBC}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 256, name: AES-CBC}, true, [\])] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-CTR.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-CTR.html.ini new file mode 100644 index 000000000..666a24aef --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-CTR.html.ini @@ -0,0 +1,2216 @@ +[test_failures_AES-CTR.html] + type: testharness + [Bad algorithm: generateKey(AES, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Empty usages: generateKey({length: 128, name: AES-CTR}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 128, name: AES-CTR}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 192, name: AES-CTR}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 192, name: AES-CTR}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 256, name: AES-CTR}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 256, name: AES-CTR}, true, [\])] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-GCM.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-GCM.html.ini new file mode 100644 index 000000000..36b0ac761 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-GCM.html.ini @@ -0,0 +1,2216 @@ +[test_failures_AES-GCM.html] + type: testharness + [Bad algorithm: generateKey(AES, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Empty usages: generateKey({length: 128, name: AES-GCM}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 128, name: AES-GCM}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 192, name: AES-GCM}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 192, name: AES-GCM}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 256, name: AES-GCM}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 256, name: AES-GCM}, true, [\])] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-KW.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-KW.html.ini new file mode 100644 index 000000000..ac790b068 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-KW.html.ini @@ -0,0 +1,1442 @@ +[test_failures_AES-KW.html] + type: testharness + [Bad algorithm: generateKey(AES, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])] + expected: FAIL + + [Empty usages: generateKey({length: 128, name: AES-KW}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 128, name: AES-KW}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 192, name: AES-KW}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 192, name: AES-KW}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 256, name: AES-KW}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 256, name: AES-KW}, true, [\])] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_ECDH.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_ECDH.html.ini new file mode 100644 index 000000000..08824a106 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_ECDH.html.ini @@ -0,0 +1,1262 @@ +[test_failures_ECDH.html] + type: testharness + [Bad algorithm: generateKey(AES, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Empty usages: generateKey({name: ECDH, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: ECDH, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({name: ECDH, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: ECDH, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({name: ECDH, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: ECDH, namedCurve: P-521}, true, [\])] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_ECDSA.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_ECDSA.html.ini new file mode 100644 index 000000000..18a00325c --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_ECDSA.html.ini @@ -0,0 +1,1208 @@ +[test_failures_ECDSA.html] + type: testharness + [Bad algorithm: generateKey(AES, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: FAIL + + [Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [\])] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_HMAC.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_HMAC.html.ini new file mode 100644 index 000000000..b23ce7dae --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_HMAC.html.ini @@ -0,0 +1,1358 @@ +[test_failures_HMAC.html] + type: testharness + [Bad algorithm: generateKey(AES, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, deriveBits\])] + expected: FAIL + + [Empty usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [\])] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSA-OAEP.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSA-OAEP.html.ini new file mode 100644 index 000000000..3232aff05 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSA-OAEP.html.ini @@ -0,0 +1,3772 @@ +[test_failures_RSA-OAEP.html] + type: testharness + expected: TIMEOUT + disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799 + [Bad algorithm: generateKey(AES, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, wrapKey, encrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, wrapKey, encrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, encrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, encrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [decrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [decrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [wrapKey, decrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [wrapKey, decrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, wrapKey, decrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, wrapKey, decrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, decrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, decrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, wrapKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, wrapKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [decrypt, encrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [decrypt, encrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [wrapKey, decrypt, encrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [wrapKey, decrypt, encrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, decrypt, encrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, decrypt, encrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, wrapKey, encrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, wrapKey, encrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, encrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, encrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [decrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [decrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [wrapKey, decrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [wrapKey, decrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, wrapKey, decrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, wrapKey, decrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, decrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, decrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, wrapKey\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, wrapKey\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: TIMEOUT + + [Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: TIMEOUT + + [Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: TIMEOUT + + [Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: TIMEOUT + + [Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: TIMEOUT + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSA-PSS.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSA-PSS.html.ini new file mode 100644 index 000000000..8ac457d9f --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSA-PSS.html.ini @@ -0,0 +1,1502 @@ +[test_failures_RSA-PSS.html] + type: testharness + expected: TIMEOUT + disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799 + [Bad algorithm: generateKey(AES, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [verify, sign\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [verify, sign\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify\])] + expected: TIMEOUT + + [Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: TIMEOUT + + [Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: TIMEOUT + + [Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: TIMEOUT + + [Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: TIMEOUT + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSASSA-PKCS1-v1_5.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSASSA-PKCS1-v1_5.html.ini new file mode 100644 index 000000000..50383a18e --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSASSA-PKCS1-v1_5.html.ini @@ -0,0 +1,1541 @@ +[test_failures_RSASSA-PKCS1-v1_5.html] + type: testharness + expected: TIMEOUT + disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799 + [Bad algorithm: generateKey(AES, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [verify, sign\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [verify, sign\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify\])] + expected: TIMEOUT + + [Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: TIMEOUT + + [Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: TIMEOUT + + [Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: TIMEOUT + + [Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: TIMEOUT + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes.html.ini new file mode 100644 index 000000000..c18e5a917 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes.html.ini @@ -0,0 +1,3 @@ +[test_successes.html] + type: testharness + disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799 diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_AES-CBC.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_AES-CBC.html.ini new file mode 100644 index 000000000..eade3f178 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_AES-CBC.html.ini @@ -0,0 +1,6 @@ +[test_successes_AES-CBC.html] + type: testharness + expected: + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799 diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSA-OAEP.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSA-OAEP.html.ini new file mode 100644 index 000000000..0760c5c25 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSA-OAEP.html.ini @@ -0,0 +1,1907 @@ +[test_successes_RSA-OAEP.html] + type: testharness + expected: TIMEOUT + disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799 + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey\])] + expected: + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey\])] + expected: + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, encrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, encrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, encrypt\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt, encrypt\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt\])] + expected: + if debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, encrypt\])] + expected: + if debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt\])] + expected: + if debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, encrypt\])] + expected: + if debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt\])] + expected: + if debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: + if debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: + if debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt\])] + expected: + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt\])] + expected: + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt\])] + expected: + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt\])] + expected: + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt\])] + expected: + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt\])] + expected: + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey\])] + expected: + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey\])] + expected: + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey\])] + expected: + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])] + expected: + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: TIMEOUT + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSA-PSS.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSA-PSS.html.ini new file mode 100644 index 000000000..3bfe95b8c --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSA-PSS.html.ini @@ -0,0 +1,57 @@ +[test_successes_RSA-PSS.html] + type: testharness + disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799 + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])] + expected: + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])] + expected: + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSASSA-PKCS1-v1_5.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSASSA-PKCS1-v1_5.html.ini new file mode 100644 index 000000000..f2c0fdb17 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSASSA-PKCS1-v1_5.html.ini @@ -0,0 +1,78 @@ +[test_successes_RSASSA-PKCS1-v1_5.html] + type: testharness + disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799 + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])] + expected: + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])] + expected: + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])] + expected: + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + diff --git a/testing/web-platform/meta/WebCryptoAPI/idlharness.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/idlharness.worker.js.ini new file mode 100644 index 000000000..43fd9d114 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/idlharness.worker.js.ini @@ -0,0 +1,32 @@ +[idlharness.worker] + type: testharness + [CryptoKey interface: existence and properties of interface object] + expected: FAIL + + [CryptoKey interface object length] + expected: FAIL + + [CryptoKey interface object name] + expected: FAIL + + [CryptoKey interface: existence and properties of interface prototype object] + expected: FAIL + + [CryptoKey interface: existence and properties of interface prototype object's "constructor" property] + expected: FAIL + + [CryptoKey interface: attribute type] + expected: FAIL + + [CryptoKey interface: attribute extractable] + expected: FAIL + + [CryptoKey interface: attribute algorithm] + expected: FAIL + + [CryptoKey interface: attribute usages] + expected: FAIL + + [ArrayBuffer interface: existence and properties of interface object] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/ec_importKey.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/ec_importKey.worker.js.ini new file mode 100644 index 000000000..b959d7400 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/import_export/ec_importKey.worker.js.ini @@ -0,0 +1,92 @@ +[ec_importKey.worker] + type: testharness + [Good parameters: P-256 bits (spki, buffer(91), {name: ECDSA, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, true, [sign\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, false, [sign\])] + expected: FAIL + + [Good parameters: P-384 bits (spki, buffer(120), {name: ECDSA, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, true, [sign\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, false, [sign\])] + expected: FAIL + + [Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, true, [sign\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, false, [sign\])] + expected: FAIL + + [Good parameters: P-256 bits (spki, buffer(91), {name: ECDH, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: P-384 bits (spki, buffer(120), {name: ECDH, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits\])] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/test_ec_importKey.html.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/test_ec_importKey.html.ini new file mode 100644 index 000000000..6217e5a57 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/import_export/test_ec_importKey.html.ini @@ -0,0 +1,92 @@ +[test_ec_importKey.html] + type: testharness + [Good parameters: P-256 bits (spki, buffer(91), {name: ECDSA, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, true, [sign\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, false, [sign\])] + expected: FAIL + + [Good parameters: P-384 bits (spki, buffer(120), {name: ECDSA, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, true, [sign\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, false, [sign\])] + expected: FAIL + + [Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, true, [sign\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, false, [sign\])] + expected: FAIL + + [Good parameters: P-256 bits (spki, buffer(91), {name: ECDH, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: P-384 bits (spki, buffer(120), {name: ECDH, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits\])] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.worker.js.ini new file mode 100644 index 000000000..895c0cfea --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.worker.js.ini @@ -0,0 +1,506 @@ +[ecdsa.worker] + type: testharness + [importVectorKeys step: ECDSA P-256 with SHA-1 verification] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 verification] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 verification] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 verification] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 verification] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 verification] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 verification] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 verification] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 verification] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-256 verification] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-384 verification] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-512 verification] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-1 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-256 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-384 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-512 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-1 with altered plaintext after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 with altered plaintext after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 with altered plaintext after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 with altered plaintext after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 with altered plaintext after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 with altered plaintext after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 with altered plaintext after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 with altered plaintext after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 with altered plaintext after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-256 with altered plaintext after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-384 with altered plaintext after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-512 with altered plaintext after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-1 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-256 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-384 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-512 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-1 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-256 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-384 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-512 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-1 no verify usage] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 no verify usage] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 no verify usage] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 no verify usage] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 no verify usage] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 no verify usage] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 no verify usage] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 no verify usage] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 no verify usage] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-256 no verify usage] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-384 no verify usage] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-512 no verify usage] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-1 round trip] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 round trip] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 round trip] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 round trip] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 round trip] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 round trip] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 round trip] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 round trip] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 round trip] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-256 round trip] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-384 round trip] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-512 round trip] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to wrong hash] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to wrong hash] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to wrong hash] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to wrong hash] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to wrong hash] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to wrong hash] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to wrong hash] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to wrong hash] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to wrong hash] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to wrong hash] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to wrong hash] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to wrong hash] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to altered plaintext] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to altered plaintext] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to altered plaintext] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to altered plaintext] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to altered plaintext] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to altered plaintext] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to altered plaintext] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to altered plaintext] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered plaintext] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered plaintext] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered plaintext] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered plaintext] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-1 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-256 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-384 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-512 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-1 verifying with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 verifying with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 verifying with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 verifying with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 verifying with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 verifying with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 verifying with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 verifying with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 verifying with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-256 verifying with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-384 verifying with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-512 verifying with wrong algorithm name] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/test_ecdsa.html.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/test_ecdsa.html.ini new file mode 100644 index 000000000..5d8f42f69 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/test_ecdsa.html.ini @@ -0,0 +1,389 @@ +[test_ecdsa.html] + type: testharness + [importVectorKeys step: ECDSA P-256 with SHA-1 verification] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 verification] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 verification] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 verification] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 verification] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 verification] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 verification] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 verification] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 verification] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-256 verification] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-384 verification] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-512 verification] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-1 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-256 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-384 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-512 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-1 with altered plaintext after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 with altered plaintext after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 with altered plaintext after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 with altered plaintext after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 with altered plaintext after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 with altered plaintext after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 with altered plaintext after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 with altered plaintext after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 with altered plaintext after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-256 with altered plaintext after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-384 with altered plaintext after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-512 with altered plaintext after call] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-1 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-256 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-384 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-512 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-1 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-256 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-384 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-512 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-1 no verify usage] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 no verify usage] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 no verify usage] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 no verify usage] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 no verify usage] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 no verify usage] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 no verify usage] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 no verify usage] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 no verify usage] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-256 no verify usage] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-384 no verify usage] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-512 no verify usage] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-1 round trip] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 round trip] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 round trip] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 round trip] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 round trip] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 round trip] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 round trip] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 round trip] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 round trip] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-256 round trip] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-384 round trip] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-512 round trip] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to wrong hash] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to wrong hash] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to wrong hash] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to wrong hash] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to wrong hash] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to wrong hash] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to wrong hash] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to wrong hash] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to wrong hash] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to wrong hash] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to wrong hash] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to wrong hash] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to shortened signature] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/test_wrapKey_unwrapKey.html.ini b/testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/test_wrapKey_unwrapKey.html.ini new file mode 100644 index 000000000..5ed9cf5e6 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/test_wrapKey_unwrapKey.html.ini @@ -0,0 +1,173 @@ +[test_wrapKey_unwrapKey.html] + type: testharness + [Can wrap and unwrap AES-KW keys using raw and AES-CTR] + expected: FAIL + + [Can wrap and unwrap AES-KW keys using jwk and AES-CTR] + expected: FAIL + + [Can wrap and unwrap ECDH public key keys using spki and AES-CTR] + expected: FAIL + + [Can wrap and unwrap ECDH public key keys using jwk and AES-CTR] + expected: FAIL + + [Can wrap and unwrap ECDH private key keys using pkcs8 and AES-CTR] + expected: FAIL + + [Can wrap and unwrap ECDH private key keys using jwk and AES-CTR] + expected: FAIL + + [Can wrap and unwrap ECDSA public key keys using spki and AES-CTR] + expected: FAIL + + [Can wrap and unwrap ECDSA public key keys using jwk and AES-CTR] + expected: FAIL + + [Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-CTR] + expected: FAIL + + [Can wrap and unwrap ECDSA private key keys using jwk and AES-CTR] + expected: FAIL + + [Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-KW] + expected: FAIL + + [Can wrap and unwrap RSA-PSS private key keys using jwk and AES-KW] + expected: FAIL + + [Can wrap and unwrap AES-CTR keys using jwk and AES-KW] + expected: FAIL + + [Can wrap and unwrap AES-CBC keys using jwk and AES-KW] + expected: FAIL + + [Can wrap and unwrap AES-GCM keys using jwk and AES-KW] + expected: FAIL + + [Can wrap and unwrap AES-KW keys using raw and AES-KW] + expected: FAIL + + [Can wrap and unwrap AES-KW keys using jwk and AES-KW] + expected: FAIL + + [Can wrap and unwrap HMAC keys using jwk and AES-KW] + expected: FAIL + + [Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-KW] + expected: FAIL + + [Can wrap and unwrap ECDH public key keys using spki and AES-KW] + expected: FAIL + + [Can wrap and unwrap ECDH public key keys using jwk and AES-KW] + expected: FAIL + + [Can wrap and unwrap ECDH private key keys using pkcs8 and AES-KW] + expected: FAIL + + [Can wrap and unwrap ECDH private key keys using jwk and AES-KW] + expected: FAIL + + [Can wrap and unwrap ECDSA public key keys using spki and AES-KW] + expected: FAIL + + [Can wrap and unwrap ECDSA public key keys using jwk and AES-KW] + expected: FAIL + + [Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-KW] + expected: FAIL + + [Can wrap and unwrap ECDSA private key keys using jwk and AES-KW] + expected: FAIL + + [Can wrap and unwrap AES-KW keys using raw and AES-GCM] + expected: FAIL + + [Can wrap and unwrap AES-KW keys using jwk and AES-GCM] + expected: FAIL + + [Can wrap and unwrap ECDH public key keys using spki and AES-GCM] + expected: FAIL + + [Can wrap and unwrap ECDH public key keys using jwk and AES-GCM] + expected: FAIL + + [Can wrap and unwrap ECDH private key keys using pkcs8 and AES-GCM] + expected: FAIL + + [Can wrap and unwrap ECDH private key keys using jwk and AES-GCM] + expected: FAIL + + [Can wrap and unwrap ECDSA public key keys using spki and AES-GCM] + expected: FAIL + + [Can wrap and unwrap ECDSA public key keys using jwk and AES-GCM] + expected: FAIL + + [Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-GCM] + expected: FAIL + + [Can wrap and unwrap ECDSA private key keys using jwk and AES-GCM] + expected: FAIL + + [Can wrap and unwrap AES-KW keys using raw and RSA-OAEP] + expected: FAIL + + [Can wrap and unwrap AES-KW keys using jwk and RSA-OAEP] + expected: FAIL + + [Can wrap and unwrap ECDH public key keys using spki and RSA-OAEP] + expected: FAIL + + [Can wrap and unwrap ECDH public key keys using jwk and RSA-OAEP] + expected: FAIL + + [Can wrap and unwrap ECDH private key keys using pkcs8 and RSA-OAEP] + expected: FAIL + + [Can wrap and unwrap ECDH private key keys using jwk and RSA-OAEP] + expected: FAIL + + [Can wrap and unwrap ECDSA public key keys using spki and RSA-OAEP] + expected: FAIL + + [Can wrap and unwrap ECDSA public key keys using jwk and RSA-OAEP] + expected: FAIL + + [Can wrap and unwrap ECDSA private key keys using pkcs8 and RSA-OAEP] + expected: FAIL + + [Can wrap and unwrap ECDSA private key keys using jwk and RSA-OAEP] + expected: FAIL + + [Can wrap and unwrap AES-KW keys using raw and AES-CBC] + expected: FAIL + + [Can wrap and unwrap AES-KW keys using jwk and AES-CBC] + expected: FAIL + + [Can wrap and unwrap ECDH public key keys using spki and AES-CBC] + expected: FAIL + + [Can wrap and unwrap ECDH public key keys using jwk and AES-CBC] + expected: FAIL + + [Can wrap and unwrap ECDH private key keys using pkcs8 and AES-CBC] + expected: FAIL + + [Can wrap and unwrap ECDH private key keys using jwk and AES-CBC] + expected: FAIL + + [Can wrap and unwrap ECDSA public key keys using spki and AES-CBC] + expected: FAIL + + [Can wrap and unwrap ECDSA public key keys using jwk and AES-CBC] + expected: FAIL + + [Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-CBC] + expected: FAIL + + [Can wrap and unwrap ECDSA private key keys using jwk and AES-CBC] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.worker.js.ini new file mode 100644 index 000000000..d036154fb --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.worker.js.ini @@ -0,0 +1,173 @@ +[wrapKey_unwrapKey.worker] + type: testharness + [Can wrap and unwrap AES-KW keys using raw and AES-CTR] + expected: FAIL + + [Can wrap and unwrap AES-KW keys using jwk and AES-CTR] + expected: FAIL + + [Can wrap and unwrap ECDSA public key keys using spki and AES-CTR] + expected: FAIL + + [Can wrap and unwrap ECDSA public key keys using jwk and AES-CTR] + expected: FAIL + + [Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-CTR] + expected: FAIL + + [Can wrap and unwrap ECDSA private key keys using jwk and AES-CTR] + expected: FAIL + + [Can wrap and unwrap ECDH public key keys using spki and AES-CTR] + expected: FAIL + + [Can wrap and unwrap ECDH public key keys using jwk and AES-CTR] + expected: FAIL + + [Can wrap and unwrap ECDH private key keys using pkcs8 and AES-CTR] + expected: FAIL + + [Can wrap and unwrap ECDH private key keys using jwk and AES-CTR] + expected: FAIL + + [Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-KW] + expected: FAIL + + [Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-KW] + expected: FAIL + + [Can wrap and unwrap AES-CTR keys using jwk and AES-KW] + expected: FAIL + + [Can wrap and unwrap AES-CBC keys using jwk and AES-KW] + expected: FAIL + + [Can wrap and unwrap AES-GCM keys using jwk and AES-KW] + expected: FAIL + + [Can wrap and unwrap AES-KW keys using raw and AES-KW] + expected: FAIL + + [Can wrap and unwrap AES-KW keys using jwk and AES-KW] + expected: FAIL + + [Can wrap and unwrap HMAC keys using jwk and AES-KW] + expected: FAIL + + [Can wrap and unwrap RSA-PSS private key keys using jwk and AES-KW] + expected: FAIL + + [Can wrap and unwrap ECDSA public key keys using spki and AES-KW] + expected: FAIL + + [Can wrap and unwrap ECDSA public key keys using jwk and AES-KW] + expected: FAIL + + [Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-KW] + expected: FAIL + + [Can wrap and unwrap ECDSA private key keys using jwk and AES-KW] + expected: FAIL + + [Can wrap and unwrap ECDH public key keys using spki and AES-KW] + expected: FAIL + + [Can wrap and unwrap ECDH public key keys using jwk and AES-KW] + expected: FAIL + + [Can wrap and unwrap ECDH private key keys using pkcs8 and AES-KW] + expected: FAIL + + [Can wrap and unwrap ECDH private key keys using jwk and AES-KW] + expected: FAIL + + [Can wrap and unwrap AES-KW keys using raw and AES-GCM] + expected: FAIL + + [Can wrap and unwrap AES-KW keys using jwk and AES-GCM] + expected: FAIL + + [Can wrap and unwrap ECDSA public key keys using spki and AES-GCM] + expected: FAIL + + [Can wrap and unwrap ECDSA public key keys using jwk and AES-GCM] + expected: FAIL + + [Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-GCM] + expected: FAIL + + [Can wrap and unwrap ECDSA private key keys using jwk and AES-GCM] + expected: FAIL + + [Can wrap and unwrap ECDH public key keys using spki and AES-GCM] + expected: FAIL + + [Can wrap and unwrap ECDH public key keys using jwk and AES-GCM] + expected: FAIL + + [Can wrap and unwrap ECDH private key keys using pkcs8 and AES-GCM] + expected: FAIL + + [Can wrap and unwrap ECDH private key keys using jwk and AES-GCM] + expected: FAIL + + [Can wrap and unwrap AES-KW keys using raw and AES-CBC] + expected: FAIL + + [Can wrap and unwrap AES-KW keys using jwk and AES-CBC] + expected: FAIL + + [Can wrap and unwrap ECDSA public key keys using spki and AES-CBC] + expected: FAIL + + [Can wrap and unwrap ECDSA public key keys using jwk and AES-CBC] + expected: FAIL + + [Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-CBC] + expected: FAIL + + [Can wrap and unwrap ECDSA private key keys using jwk and AES-CBC] + expected: FAIL + + [Can wrap and unwrap ECDH public key keys using spki and AES-CBC] + expected: FAIL + + [Can wrap and unwrap ECDH public key keys using jwk and AES-CBC] + expected: FAIL + + [Can wrap and unwrap ECDH private key keys using pkcs8 and AES-CBC] + expected: FAIL + + [Can wrap and unwrap ECDH private key keys using jwk and AES-CBC] + expected: FAIL + + [Can wrap and unwrap AES-KW keys using raw and RSA-OAEP] + expected: FAIL + + [Can wrap and unwrap AES-KW keys using jwk and RSA-OAEP] + expected: FAIL + + [Can wrap and unwrap ECDSA public key keys using spki and RSA-OAEP] + expected: FAIL + + [Can wrap and unwrap ECDSA public key keys using jwk and RSA-OAEP] + expected: FAIL + + [Can wrap and unwrap ECDSA private key keys using pkcs8 and RSA-OAEP] + expected: FAIL + + [Can wrap and unwrap ECDSA private key keys using jwk and RSA-OAEP] + expected: FAIL + + [Can wrap and unwrap ECDH public key keys using spki and RSA-OAEP] + expected: FAIL + + [Can wrap and unwrap ECDH public key keys using jwk and RSA-OAEP] + expected: FAIL + + [Can wrap and unwrap ECDH private key keys using pkcs8 and RSA-OAEP] + expected: FAIL + + [Can wrap and unwrap ECDH private key keys using jwk and RSA-OAEP] + expected: FAIL + |