diff --git a/testing/web-platform/meta/FileAPI/blob/Blob-constructor.html.ini b/testing/web-platform/meta/FileAPI/blob/Blob-constructor.html.ini index da824c5afd81..1f5fc0c1eac9 100644 --- a/testing/web-platform/meta/FileAPI/blob/Blob-constructor.html.ini +++ b/testing/web-platform/meta/FileAPI/blob/Blob-constructor.html.ini @@ -53,3 +53,4 @@ [Blob with type "image/gif\\0"] expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CBC.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CBC.worker.js.ini new file mode 100644 index 000000000000..7b3310b78b5e --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CBC.worker.js.ini @@ -0,0 +1,3 @@ +[failures_AES-CBC.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.worker.js.ini new file mode 100644 index 000000000000..472b09dd1eec --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.worker.js.ini @@ -0,0 +1,3 @@ +[failures_AES-CTR.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.worker.js.ini new file mode 100644 index 000000000000..64e9f58f061e --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.worker.js.ini @@ -0,0 +1,3 @@ +[failures_AES-GCM.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.worker.js.ini new file mode 100644 index 000000000000..96031ce55c35 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.worker.js.ini @@ -0,0 +1,3 @@ +[failures_AES-KW.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.worker.js.ini new file mode 100644 index 000000000000..49ab628294f6 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.worker.js.ini @@ -0,0 +1,3 @@ +[failures_ECDH.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.worker.js.ini new file mode 100644 index 000000000000..2fd250f45009 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.worker.js.ini @@ -0,0 +1,3 @@ +[failures_ECDSA.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.worker.js.ini new file mode 100644 index 000000000000..411ecbddac94 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.worker.js.ini @@ -0,0 +1,3 @@ +[failures_HMAC.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.worker.js.ini new file mode 100644 index 000000000000..3ec9c3c5388e --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.worker.js.ini @@ -0,0 +1,3 @@ +[failures_RSA-OAEP.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.worker.js.ini new file mode 100644 index 000000000000..7b28b2c0480d --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.worker.js.ini @@ -0,0 +1,3 @@ +[failures_RSA-PSS.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.worker.js.ini new file mode 100644 index 000000000000..5cb45ae095bc --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.worker.js.ini @@ -0,0 +1,3 @@ +[failures_RSASSA-PKCS1-v1_5.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.worker.js.ini new file mode 100644 index 000000000000..e9a9e303a252 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.worker.js.ini @@ -0,0 +1,3 @@ +[successes_AES-CBC.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.worker.js.ini new file mode 100644 index 000000000000..dcf7febafe57 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.worker.js.ini @@ -0,0 +1,3 @@ +[successes_AES-CTR.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.worker.js.ini new file mode 100644 index 000000000000..4b949a1b47d9 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.worker.js.ini @@ -0,0 +1,3 @@ +[successes_AES-GCM.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.worker.js.ini new file mode 100644 index 000000000000..5efa92cfc5d3 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.worker.js.ini @@ -0,0 +1,3 @@ +[successes_AES-KW.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.worker.js.ini new file mode 100644 index 000000000000..42eac719df68 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.worker.js.ini @@ -0,0 +1,3 @@ +[successes_ECDH.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.worker.js.ini new file mode 100644 index 000000000000..0d73e197cf96 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.worker.js.ini @@ -0,0 +1,3 @@ +[successes_ECDSA.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.worker.js.ini new file mode 100644 index 000000000000..84b2544fd818 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.worker.js.ini @@ -0,0 +1,3 @@ +[successes_HMAC.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.worker.js.ini new file mode 100644 index 000000000000..f4e683fa2df3 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.worker.js.ini @@ -0,0 +1,3 @@ +[successes_RSA-OAEP.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.worker.js.ini new file mode 100644 index 000000000000..76a093185448 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.worker.js.ini @@ -0,0 +1,3 @@ +[successes_RSA-PSS.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.worker.js.ini new file mode 100644 index 000000000000..95acb89f6294 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.worker.js.ini @@ -0,0 +1,3 @@ +[successes_RSASSA-PKCS1-v1_5.worker] + type: testharness + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-CBC.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-CBC.html.ini new file mode 100644 index 000000000000..d5c9d05cc63d --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-CBC.html.ini @@ -0,0 +1,2216 @@ +[test_failures_AES-CBC.html] + type: testharness + [Bad algorithm: generateKey(AES, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Empty usages: generateKey({length: 128, name: AES-CBC}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 128, name: AES-CBC}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 192, name: AES-CBC}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 192, name: AES-CBC}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 256, name: AES-CBC}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 256, name: AES-CBC}, true, [\])] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-CTR.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-CTR.html.ini new file mode 100644 index 000000000000..666a24aef8fc --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-CTR.html.ini @@ -0,0 +1,2216 @@ +[test_failures_AES-CTR.html] + type: testharness + [Bad algorithm: generateKey(AES, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Empty usages: generateKey({length: 128, name: AES-CTR}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 128, name: AES-CTR}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 192, name: AES-CTR}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 192, name: AES-CTR}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 256, name: AES-CTR}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 256, name: AES-CTR}, true, [\])] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-GCM.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-GCM.html.ini new file mode 100644 index 000000000000..36b0ac7619b2 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-GCM.html.ini @@ -0,0 +1,2216 @@ +[test_failures_AES-GCM.html] + type: testharness + [Bad algorithm: generateKey(AES, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: FAIL + + [Empty usages: generateKey({length: 128, name: AES-GCM}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 128, name: AES-GCM}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 192, name: AES-GCM}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 192, name: AES-GCM}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 256, name: AES-GCM}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 256, name: AES-GCM}, true, [\])] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-KW.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-KW.html.ini new file mode 100644 index 000000000000..ac790b068daa --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-KW.html.ini @@ -0,0 +1,1442 @@ +[test_failures_AES-KW.html] + type: testharness + [Bad algorithm: generateKey(AES, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])] + expected: FAIL + + [Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])] + expected: FAIL + + [Empty usages: generateKey({length: 128, name: AES-KW}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 128, name: AES-KW}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 192, name: AES-KW}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 192, name: AES-KW}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 256, name: AES-KW}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({length: 256, name: AES-KW}, true, [\])] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_ECDH.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_ECDH.html.ini new file mode 100644 index 000000000000..08824a106087 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_ECDH.html.ini @@ -0,0 +1,1262 @@ +[test_failures_ECDH.html] + type: testharness + [Bad algorithm: generateKey(AES, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Empty usages: generateKey({name: ECDH, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: ECDH, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({name: ECDH, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: ECDH, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({name: ECDH, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: ECDH, namedCurve: P-521}, true, [\])] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_ECDSA.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_ECDSA.html.ini new file mode 100644 index 000000000000..18a00325cdd0 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_ECDSA.html.ini @@ -0,0 +1,1208 @@ +[test_failures_ECDSA.html] + type: testharness + [Bad algorithm: generateKey(AES, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: FAIL + + [Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [\])] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_HMAC.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_HMAC.html.ini new file mode 100644 index 000000000000..b23ce7dae906 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_HMAC.html.ini @@ -0,0 +1,1358 @@ +[test_failures_HMAC.html] + type: testharness + [Bad algorithm: generateKey(AES, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, deriveBits\])] + expected: FAIL + + [Empty usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [\])] + expected: FAIL + + [Empty usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [\])] + expected: FAIL + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSA-OAEP.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSA-OAEP.html.ini new file mode 100644 index 000000000000..3232aff0546d --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSA-OAEP.html.ini @@ -0,0 +1,3772 @@ +[test_failures_RSA-OAEP.html] + type: testharness + expected: TIMEOUT + disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799 + [Bad algorithm: generateKey(AES, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, verify\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, wrapKey, encrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, wrapKey, encrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, encrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, encrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [decrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [decrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [wrapKey, decrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [wrapKey, decrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, wrapKey, decrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, wrapKey, decrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, decrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, decrypt\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, wrapKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, wrapKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [decrypt, encrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [decrypt, encrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [wrapKey, decrypt, encrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [wrapKey, decrypt, encrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, decrypt, encrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, decrypt, encrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, wrapKey, encrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, wrapKey, encrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, encrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, encrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [decrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [decrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [wrapKey, decrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [wrapKey, decrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, wrapKey, decrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, wrapKey, decrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, decrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, decrypt\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, wrapKey\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, wrapKey\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: TIMEOUT + + [Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: TIMEOUT + + [Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: TIMEOUT + + [Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: TIMEOUT + + [Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: TIMEOUT + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSA-PSS.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSA-PSS.html.ini new file mode 100644 index 000000000000..8ac457d9f2c4 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSA-PSS.html.ini @@ -0,0 +1,1502 @@ +[test_failures_RSA-PSS.html] + type: testharness + expected: TIMEOUT + disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799 + [Bad algorithm: generateKey(AES, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [verify, sign\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [verify, sign\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify\])] + expected: TIMEOUT + + [Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: TIMEOUT + + [Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: TIMEOUT + + [Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: TIMEOUT + + [Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: TIMEOUT + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSASSA-PKCS1-v1_5.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSASSA-PKCS1-v1_5.html.ini new file mode 100644 index 000000000000..50383a18e3a0 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSASSA-PKCS1-v1_5.html.ini @@ -0,0 +1,1541 @@ +[test_failures_RSASSA-PKCS1-v1_5.html] + type: testharness + expected: TIMEOUT + disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799 + [Bad algorithm: generateKey(AES, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [verify, sign\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [verify, sign\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify\])] + expected: TIMEOUT + + [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify\])] + expected: TIMEOUT + + [Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: TIMEOUT + + [Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: TIMEOUT + + [Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])] + expected: TIMEOUT + + [Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])] + expected: TIMEOUT + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_AES-CBC.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_AES-CBC.html.ini new file mode 100644 index 000000000000..eade3f178b63 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_AES-CBC.html.ini @@ -0,0 +1,6 @@ +[test_successes_AES-CBC.html] + type: testharness + expected: + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799 diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSA-OAEP.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSA-OAEP.html.ini new file mode 100644 index 000000000000..0760c5c2524e --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSA-OAEP.html.ini @@ -0,0 +1,1907 @@ +[test_successes_RSA-OAEP.html] + type: testharness + expected: TIMEOUT + disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799 + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey\])] + expected: + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey\])] + expected: + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, encrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, encrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, encrypt\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt, encrypt\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt\])] + expected: + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt, encrypt\])] + expected: + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt, encrypt\])] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT + if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt\])] + expected: + if debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, encrypt\])] + expected: + if debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt\])] + expected: + if debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, encrypt\])] + expected: + if debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt\])] + expected: + if debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])] + expected: + if debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])] + expected: + if debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt\])] + expected: + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt\])] + expected: + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt\])] + expected: + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt\])] + expected: + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt\])] + expected: + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt\])] + expected: + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey\])] + expected: + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey\])] + expected: + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey\])] + expected: + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])] + expected: + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: + if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS + TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])] + expected: TIMEOUT + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSA-PSS.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSA-PSS.html.ini new file mode 100644 index 000000000000..3bfe95b8ca42 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSA-PSS.html.ini @@ -0,0 +1,57 @@ +[test_successes_RSA-PSS.html] + type: testharness + disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799 + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])] + expected: + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])] + expected: + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSASSA-PKCS1-v1_5.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSASSA-PKCS1-v1_5.html.ini new file mode 100644 index 000000000000..f2c0fdb1752e --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSASSA-PKCS1-v1_5.html.ini @@ -0,0 +1,78 @@ +[test_successes_RSASSA-PKCS1-v1_5.html] + type: testharness + disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799 + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])] + expected: + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])] + expected: + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])] + expected: + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + + [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])] + expected: + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT + diff --git a/testing/web-platform/meta/WebCryptoAPI/idlharness.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/idlharness.worker.js.ini new file mode 100644 index 000000000000..21651b28c33c --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/idlharness.worker.js.ini @@ -0,0 +1,29 @@ +[idlharness.worker] + type: testharness + [CryptoKey interface: existence and properties of interface object] + expected: FAIL + + [CryptoKey interface object length] + expected: FAIL + + [CryptoKey interface object name] + expected: FAIL + + [CryptoKey interface: existence and properties of interface prototype object] + expected: FAIL + + [CryptoKey interface: existence and properties of interface prototype object's "constructor" property] + expected: FAIL + + [CryptoKey interface: attribute type] + expected: FAIL + + [CryptoKey interface: attribute extractable] + expected: FAIL + + [CryptoKey interface: attribute algorithm] + expected: FAIL + + [CryptoKey interface: attribute usages] + expected: FAIL + diff --git a/testing/web-platform/meta/XMLHttpRequest/open-url-bogus.htm.ini b/testing/web-platform/meta/XMLHttpRequest/open-url-bogus.htm.ini index 5ec4b29710a8..256d1080d898 100644 --- a/testing/web-platform/meta/XMLHttpRequest/open-url-bogus.htm.ini +++ b/testing/web-platform/meta/XMLHttpRequest/open-url-bogus.htm.ini @@ -3,3 +3,12 @@ [XMLHttpRequest: open() - bogus URLs (http:)] expected: FAIL + [XMLHttpRequest: open() - bogus URLs (ftp:)] + expected: FAIL + + [XMLHttpRequest: open() - bogus URLs (http:////////////)] + expected: FAIL + + [XMLHttpRequest: open() - bogus URLs (http://u:p@/)] + expected: FAIL + diff --git a/testing/web-platform/meta/cors/response-headers.htm.ini b/testing/web-platform/meta/cors/response-headers.htm.ini index bc138e99e6d7..042b82da6a5d 100644 --- a/testing/web-platform/meta/cors/response-headers.htm.ini +++ b/testing/web-platform/meta/cors/response-headers.htm.ini @@ -2,3 +2,4 @@ type: testharness [getResponseHeader: Combined testing of cors response headers] expected: FAIL + diff --git a/testing/web-platform/meta/dom/historical.html.ini b/testing/web-platform/meta/dom/historical.html.ini index 90ef48287f57..967ddbaed05a 100644 --- a/testing/web-platform/meta/dom/historical.html.ini +++ b/testing/web-platform/meta/dom/historical.html.ini @@ -9,3 +9,6 @@ [Historical DOM features must be removed: createCDATASection] expected: FAIL + [Node member must be nuked: rootNode] + expected: FAIL + diff --git a/testing/web-platform/meta/dom/interfaces.html.ini b/testing/web-platform/meta/dom/interfaces.html.ini index 276667a1e76f..46ca980d127e 100644 --- a/testing/web-platform/meta/dom/interfaces.html.ini +++ b/testing/web-platform/meta/dom/interfaces.html.ini @@ -141,3 +141,4 @@ [Text interface: document.createTextNode("abc") must inherit property "assignedSlot" with the proper type (2)] expected: FAIL + diff --git a/testing/web-platform/meta/fetch/api/redirect/redirect-location-worker.html.ini b/testing/web-platform/meta/fetch/api/redirect/redirect-location-worker.html.ini index 7ee12cb3e705..af37b7bf83a4 100644 --- a/testing/web-platform/meta/fetch/api/redirect/redirect-location-worker.html.ini +++ b/testing/web-platform/meta/fetch/api/redirect/redirect-location-worker.html.ini @@ -3,30 +3,15 @@ [Redirect 301 in "manual" mode without location] expected: FAIL - [Redirect 301 in "manual" mode with invalid location] - expected: FAIL - [Redirect 302 in "manual" mode without location] expected: FAIL - [Redirect 302 in "manual" mode with invalid location] - expected: FAIL - [Redirect 303 in "manual" mode without location] expected: FAIL - [Redirect 303 in "manual" mode with invalid location] - expected: FAIL - [Redirect 307 in "manual" mode without location] expected: FAIL - [Redirect 307 in "manual" mode with invalid location] - expected: FAIL - [Redirect 308 in "manual" mode without location] expected: FAIL - [Redirect 308 in "manual" mode with invalid location] - expected: FAIL - diff --git a/testing/web-platform/meta/fetch/api/redirect/redirect-location.html.ini b/testing/web-platform/meta/fetch/api/redirect/redirect-location.html.ini index e5ada488036a..e876cd4944bb 100644 --- a/testing/web-platform/meta/fetch/api/redirect/redirect-location.html.ini +++ b/testing/web-platform/meta/fetch/api/redirect/redirect-location.html.ini @@ -3,30 +3,15 @@ [Redirect 301 in "manual" mode without location] expected: FAIL - [Redirect 301 in "manual" mode with invalid location] - expected: FAIL - [Redirect 302 in "manual" mode without location] expected: FAIL - [Redirect 302 in "manual" mode with invalid location] - expected: FAIL - [Redirect 303 in "manual" mode without location] expected: FAIL - [Redirect 303 in "manual" mode with invalid location] - expected: FAIL - [Redirect 307 in "manual" mode without location] expected: FAIL - [Redirect 307 in "manual" mode with invalid location] - expected: FAIL - [Redirect 308 in "manual" mode without location] expected: FAIL - [Redirect 308 in "manual" mode with invalid location] - expected: FAIL - diff --git a/testing/web-platform/meta/html/infrastructure/urls/resolving-urls/query-encoding/utf-16be.html.ini b/testing/web-platform/meta/html/infrastructure/urls/resolving-urls/query-encoding/utf-16be.html.ini index 3af6786be04c..a9750a833a28 100644 --- a/testing/web-platform/meta/html/infrastructure/urls/resolving-urls/query-encoding/utf-16be.html.ini +++ b/testing/web-platform/meta/html/infrastructure/urls/resolving-urls/query-encoding/utf-16be.html.ini @@ -3,7 +3,6 @@ expected: TIMEOUT disabled: if os == "mac": https://bugzilla.mozilla.org/show_bug.cgi?id=1034063 - [hyperlink auditing ] expected: TIMEOUT diff --git a/testing/web-platform/meta/html/infrastructure/urls/resolving-urls/query-encoding/utf-16le.html.ini b/testing/web-platform/meta/html/infrastructure/urls/resolving-urls/query-encoding/utf-16le.html.ini index 6131c2272867..46a6ad399951 100644 --- a/testing/web-platform/meta/html/infrastructure/urls/resolving-urls/query-encoding/utf-16le.html.ini +++ b/testing/web-platform/meta/html/infrastructure/urls/resolving-urls/query-encoding/utf-16le.html.ini @@ -3,7 +3,6 @@ disabled: if os == "mac": https://bugzilla.mozilla.org/show_bug.cgi?id=1034063 expected: TIMEOUT - [hyperlink auditing ] expected: TIMEOUT diff --git a/testing/web-platform/meta/html/infrastructure/urls/resolving-urls/query-encoding/utf-8.html.ini b/testing/web-platform/meta/html/infrastructure/urls/resolving-urls/query-encoding/utf-8.html.ini index c5fa0c75690a..5d0edcb513d9 100644 --- a/testing/web-platform/meta/html/infrastructure/urls/resolving-urls/query-encoding/utf-8.html.ini +++ b/testing/web-platform/meta/html/infrastructure/urls/resolving-urls/query-encoding/utf-8.html.ini @@ -3,7 +3,6 @@ expected: TIMEOUT disabled: if os == "mac": https://bugzilla.mozilla.org/show_bug.cgi?id=1034063 - [hyperlink auditing ] expected: TIMEOUT diff --git a/testing/web-platform/meta/html/infrastructure/urls/resolving-urls/query-encoding/windows-1252.html.ini b/testing/web-platform/meta/html/infrastructure/urls/resolving-urls/query-encoding/windows-1252.html.ini index c417c07bf6b9..994a85ae864f 100644 --- a/testing/web-platform/meta/html/infrastructure/urls/resolving-urls/query-encoding/windows-1252.html.ini +++ b/testing/web-platform/meta/html/infrastructure/urls/resolving-urls/query-encoding/windows-1252.html.ini @@ -3,7 +3,6 @@ expected: TIMEOUT disabled: if os == "mac": https://bugzilla.mozilla.org/show_bug.cgi?id=1034063 - [hyperlink auditing ] expected: TIMEOUT diff --git a/testing/web-platform/meta/html/semantics/forms/form-control-infrastructure/form.html.ini b/testing/web-platform/meta/html/semantics/forms/form-control-infrastructure/form.html.ini new file mode 100644 index 000000000000..7f869a974077 --- /dev/null +++ b/testing/web-platform/meta/html/semantics/forms/form-control-infrastructure/form.html.ini @@ -0,0 +1,8 @@ +[form.html] + type: testharness + [label-with-progress.form] + expected: FAIL + + [label-with-meter.form] + expected: FAIL + diff --git a/testing/web-platform/meta/html/semantics/forms/form-submission-0/submit-entity-body.html.ini b/testing/web-platform/meta/html/semantics/forms/form-submission-0/submit-entity-body.html.ini index 339e79832b0c..312c5fe4d89e 100644 --- a/testing/web-platform/meta/html/semantics/forms/form-submission-0/submit-entity-body.html.ini +++ b/testing/web-platform/meta/html/semantics/forms/form-submission-0/submit-entity-body.html.ini @@ -43,3 +43,146 @@ if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + [form submission from form should navigate to url with x-www-form-urlencoded] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): NOTRUN + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [form submission from form should navigate to url with multipart/form-data] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): NOTRUN + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [form submission from form should navigate to url with text/plain] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): NOTRUN + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [form submission from button should navigate to url with x-www-form-urlencoded] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): NOTRUN + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [form submission from button should navigate to url with multipart/form-data] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): NOTRUN + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [form submission from button should navigate to url with text/plain] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): NOTRUN + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [form submission from input should navigate to url with x-www-form-urlencoded] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): NOTRUN + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [form submission from input should navigate to url with multipart/form-data] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): NOTRUN + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [form submission from input should navigate to url with text/plain] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): NOTRUN + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [form submission from submit input should contain submit button value] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): NOTRUN + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + + [form submission from submit button should contain submit button value] + expected: + if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): NOTRUN + if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN + if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN + diff --git a/testing/web-platform/meta/html/semantics/forms/textfieldselection/select-event.html.ini b/testing/web-platform/meta/html/semantics/forms/textfieldselection/select-event.html.ini index 6418bf67d38d..1ec0c2836bc2 100644 --- a/testing/web-platform/meta/html/semantics/forms/textfieldselection/select-event.html.ini +++ b/testing/web-platform/meta/html/semantics/forms/textfieldselection/select-event.html.ini @@ -2,110 +2,40 @@ type: testharness expected: if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT - if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT - if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT - if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT - if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT - if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT - if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT [select() on textarea queues select event] expected: if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT - if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT - if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT - if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT - if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT - if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT - if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT FAIL [select() on input type text queues select event] expected: if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT - if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT - if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT - if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT - if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT - if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT - if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT FAIL [select() on input type search queues select event] expected: if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT - if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT - if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT - if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT - if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT - if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT - if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT FAIL [select() on input type tel queues select event] expected: if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT - if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT - if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT - if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT - if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT - if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT - if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT FAIL [select() on input type url queues select event] expected: if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT - if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT - if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT - if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT - if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT - if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT - if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT FAIL [select() on input type password queues select event] expected: if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT - if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT - if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT - if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT - if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT - if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT - if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT - if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT FAIL diff --git a/testing/web-platform/meta/html/the-xhtml-syntax/parsing-xhtml-documents/xhtml-mathml-dtd-entity-support.htm.ini b/testing/web-platform/meta/html/the-xhtml-syntax/parsing-xhtml-documents/xhtml-mathml-dtd-entity-support.htm.ini new file mode 100644 index 000000000000..c3abf690b2fe --- /dev/null +++ b/testing/web-platform/meta/html/the-xhtml-syntax/parsing-xhtml-documents/xhtml-mathml-dtd-entity-support.htm.ini @@ -0,0 +1,6 @@ +[xhtml-mathml-dtd-entity-support.htm] + type: testharness + expected: + if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): CRASH + if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): CRASH + TIMEOUT diff --git a/testing/web-platform/meta/html/webappapis/scripting/processing-model-2/body-onerror-compile-error-data-url.html.ini b/testing/web-platform/meta/html/webappapis/scripting/processing-model-2/body-onerror-compile-error-data-url.html.ini deleted file mode 100644 index 936152ab0ea1..000000000000 --- a/testing/web-platform/meta/html/webappapis/scripting/processing-model-2/body-onerror-compile-error-data-url.html.ini +++ /dev/null @@ -1,5 +0,0 @@ -[body-onerror-compile-error-data-url.html] - type: testharness - [ - compile error in