|
@@ -0,0 +1,487 @@
|
|
|
+Summary
|
|
|
+
|
|
|
+Harness status: OK
|
|
|
+
|
|
|
+Rerun
|
|
|
+
|
|
|
+Found 476 tests
|
|
|
+
|
|
|
+410 Pass
|
|
|
+66 Fail
|
|
|
+Details
|
|
|
+Result Test Name MessagePass Bad algorithm: generateKey(AES, false, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey(AES, true, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey(AES, RED, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey(AES, 7, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey(AES, false, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey(AES, true, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey(AES, RED, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey(AES, 7, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey(AES, false, [sign])
|
|
|
+Pass Bad algorithm: generateKey(AES, true, [sign])
|
|
|
+Pass Bad algorithm: generateKey(AES, RED, [sign])
|
|
|
+Pass Bad algorithm: generateKey(AES, 7, [sign])
|
|
|
+Pass Bad algorithm: generateKey(AES, false, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey(AES, true, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey(AES, RED, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey(AES, 7, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey(AES, false, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey(AES, true, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey(AES, RED, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey(AES, 7, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey(AES, false, [])
|
|
|
+Pass Bad algorithm: generateKey(AES, true, [])
|
|
|
+Pass Bad algorithm: generateKey(AES, RED, [])
|
|
|
+Pass Bad algorithm: generateKey(AES, 7, [])
|
|
|
+Pass Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, false, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, true, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, RED, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, 7, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, false, [sign])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, true, [sign])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, RED, [sign])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, 7, [sign])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, false, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, true, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, RED, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, 7, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, false, [])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, true, [])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, RED, [])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, 7, [])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])
|
|
|
+Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])
|
|
|
+Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])
|
|
|
+Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])
|
|
|
+Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])
|
|
|
+Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])
|
|
|
+Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Fail Empty algorithm: generateKey({}, false, [decrypt])
|
|
|
+Fail Empty algorithm: generateKey({}, true, [decrypt])
|
|
|
+Fail Empty algorithm: generateKey({}, RED, [decrypt])
|
|
|
+Fail Empty algorithm: generateKey({}, 7, [decrypt])
|
|
|
+Fail Empty algorithm: generateKey({}, false, [sign, decrypt])
|
|
|
+Fail Empty algorithm: generateKey({}, true, [sign, decrypt])
|
|
|
+Fail Empty algorithm: generateKey({}, RED, [sign, decrypt])
|
|
|
+Fail Empty algorithm: generateKey({}, 7, [sign, decrypt])
|
|
|
+Fail Empty algorithm: generateKey({}, false, [deriveBits, sign, decrypt])
|
|
|
+Fail Empty algorithm: generateKey({}, true, [deriveBits, sign, decrypt])
|
|
|
+Fail Empty algorithm: generateKey({}, RED, [deriveBits, sign, decrypt])
|
|
|
+Fail Empty algorithm: generateKey({}, 7, [deriveBits, sign, decrypt])
|
|
|
+Fail Empty algorithm: generateKey({}, false, [deriveBits, decrypt])
|
|
|
+Fail Empty algorithm: generateKey({}, true, [deriveBits, decrypt])
|
|
|
+Fail Empty algorithm: generateKey({}, RED, [deriveBits, decrypt])
|
|
|
+Fail Empty algorithm: generateKey({}, 7, [deriveBits, decrypt])
|
|
|
+Fail Empty algorithm: generateKey({}, false, [sign])
|
|
|
+Fail Empty algorithm: generateKey({}, true, [sign])
|
|
|
+Fail Empty algorithm: generateKey({}, RED, [sign])
|
|
|
+Fail Empty algorithm: generateKey({}, 7, [sign])
|
|
|
+Fail Empty algorithm: generateKey({}, false, [deriveBits, sign])
|
|
|
+Fail Empty algorithm: generateKey({}, true, [deriveBits, sign])
|
|
|
+Fail Empty algorithm: generateKey({}, RED, [deriveBits, sign])
|
|
|
+Fail Empty algorithm: generateKey({}, 7, [deriveBits, sign])
|
|
|
+Fail Empty algorithm: generateKey({}, false, [deriveBits])
|
|
|
+Fail Empty algorithm: generateKey({}, true, [deriveBits])
|
|
|
+Fail Empty algorithm: generateKey({}, RED, [deriveBits])
|
|
|
+Fail Empty algorithm: generateKey({}, 7, [deriveBits])
|
|
|
+Fail Empty algorithm: generateKey({}, false, [])
|
|
|
+Fail Empty algorithm: generateKey({}, true, [])
|
|
|
+Fail Empty algorithm: generateKey({}, RED, [])
|
|
|
+Fail Empty algorithm: generateKey({}, 7, [])
|
|
|
+Fail Empty algorithm: generateKey({}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Fail Empty algorithm: generateKey({}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Fail Empty algorithm: generateKey({}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Fail Empty algorithm: generateKey({}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [encrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, encrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, encrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, encrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [decrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, decrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, decrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, decrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [sign])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, sign])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, sign])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, sign])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [verify])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, verify])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, verify])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, verify])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [wrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, wrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, wrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, wrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [unwrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, unwrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, unwrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, unwrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [encrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, encrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, encrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, encrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [decrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, decrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, decrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, decrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [sign])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, sign])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, sign])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, sign])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [verify])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, verify])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, verify])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, verify])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [wrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, wrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, wrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, wrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [unwrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, unwrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, unwrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, unwrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [encrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, encrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, encrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, encrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [decrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, decrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, decrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, decrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [sign])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, sign])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, sign])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, sign])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [verify])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, verify])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, verify])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, verify])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [wrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, wrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, wrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, wrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [unwrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, unwrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, unwrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, unwrapKey])
|
|
|
+Pass Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey])
|
|
|
+Pass Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, false, [deriveKey])
|
|
|
+Pass Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, true, [deriveKey])
|
|
|
+Pass Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, false, [deriveBits, deriveKey])
|
|
|
+Pass Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, true, [deriveBits, deriveKey])
|
|
|
+Pass Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, false, [deriveBits])
|
|
|
+Pass Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, true, [deriveBits])
|
|
|
+Pass Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, false, [])
|
|
|
+Pass Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, true, [])
|
|
|
+Pass Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])
|
|
|
+Pass Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])
|
|
|
+Pass Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, false, [deriveKey])
|
|
|
+Pass Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, true, [deriveKey])
|
|
|
+Pass Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, false, [deriveBits, deriveKey])
|
|
|
+Pass Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, true, [deriveBits, deriveKey])
|
|
|
+Pass Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, false, [deriveBits])
|
|
|
+Pass Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, true, [deriveBits])
|
|
|
+Pass Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, false, [])
|
|
|
+Pass Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, true, [])
|
|
|
+Pass Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])
|
|
|
+Pass Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])
|
|
|
+Pass Empty usages: generateKey({name: ECDH, namedCurve: P-256}, false, [])
|
|
|
+Pass Empty usages: generateKey({name: ECDH, namedCurve: P-256}, true, [])
|
|
|
+Pass Empty usages: generateKey({name: ECDH, namedCurve: P-384}, false, [])
|
|
|
+Pass Empty usages: generateKey({name: ECDH, namedCurve: P-384}, true, [])
|
|
|
+Fail Empty usages: generateKey({name: ECDH, namedCurve: P-521}, false, [])
|
|
|
+Fail Empty usages: generateKey({name: ECDH, namedCurve: P-521}, true, [])
|