mirror of
https://github.com/LadybirdBrowser/ladybird
synced 2026-04-28 10:37:17 +02:00
LibWeb: Add ML-DSA test
This represents 1600+ subtests, including the worker tests.
This commit is contained in:
committed by
Jelle Raaijmakers
parent
006428db7a
commit
4868a118a5
Notes:
github-actions[bot]
2025-12-10 20:27:51 +00:00
Author: https://github.com/tete17 Commit: https://github.com/LadybirdBrowser/ladybird/commit/4868a118a5f Pull-request: https://github.com/LadybirdBrowser/ladybird/pull/6935 Reviewed-by: https://github.com/R-Goc Reviewed-by: https://github.com/gmta ✅
@@ -0,0 +1,521 @@
|
||||
Harness status: OK
|
||||
|
||||
Found 516 tests
|
||||
|
||||
516 Pass
|
||||
Pass Bad algorithm: generateKey(AES, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, false, [sign])
|
||||
Pass Bad algorithm: generateKey(AES, true, [sign])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [sign])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [sign])
|
||||
Pass Bad algorithm: generateKey(AES, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey(AES, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey(AES, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey(AES, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey(AES, false, [])
|
||||
Pass Bad algorithm: generateKey(AES, true, [])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [])
|
||||
Pass Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [sign])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [sign])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [sign])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [sign])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Empty algorithm: generateKey({}, false, [decrypt])
|
||||
Pass Empty algorithm: generateKey({}, true, [decrypt])
|
||||
Pass Empty algorithm: generateKey({}, RED, [decrypt])
|
||||
Pass Empty algorithm: generateKey({}, 7, [decrypt])
|
||||
Pass Empty algorithm: generateKey({}, false, [sign, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, true, [sign, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, RED, [sign, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, 7, [sign, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, false, [deriveBits, sign, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, true, [deriveBits, sign, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, false, [deriveBits, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, true, [deriveBits, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, RED, [deriveBits, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, 7, [deriveBits, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, false, [sign])
|
||||
Pass Empty algorithm: generateKey({}, true, [sign])
|
||||
Pass Empty algorithm: generateKey({}, RED, [sign])
|
||||
Pass Empty algorithm: generateKey({}, 7, [sign])
|
||||
Pass Empty algorithm: generateKey({}, false, [deriveBits, sign])
|
||||
Pass Empty algorithm: generateKey({}, true, [deriveBits, sign])
|
||||
Pass Empty algorithm: generateKey({}, RED, [deriveBits, sign])
|
||||
Pass Empty algorithm: generateKey({}, 7, [deriveBits, sign])
|
||||
Pass Empty algorithm: generateKey({}, false, [deriveBits])
|
||||
Pass Empty algorithm: generateKey({}, true, [deriveBits])
|
||||
Pass Empty algorithm: generateKey({}, RED, [deriveBits])
|
||||
Pass Empty algorithm: generateKey({}, 7, [deriveBits])
|
||||
Pass Empty algorithm: generateKey({}, false, [])
|
||||
Pass Empty algorithm: generateKey({}, true, [])
|
||||
Pass Empty algorithm: generateKey({}, RED, [])
|
||||
Pass Empty algorithm: generateKey({}, 7, [])
|
||||
Pass Empty algorithm: generateKey({}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Empty algorithm: generateKey({}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Empty algorithm: generateKey({}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Empty algorithm: generateKey({}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad usages: generateKey(ML-DSA-44, true, [encrypt])
|
||||
Pass Bad usages: generateKey(ML-DSA-44, true, [sign, encrypt])
|
||||
Pass Bad usages: generateKey(ML-DSA-44, true, [verify, sign, encrypt])
|
||||
Pass Bad usages: generateKey(ML-DSA-44, true, [sign, verify, sign, sign, verify, encrypt])
|
||||
Pass Bad usages: generateKey(ML-DSA-44, true, [decrypt])
|
||||
Pass Bad usages: generateKey(ML-DSA-44, true, [sign, decrypt])
|
||||
Pass Bad usages: generateKey(ML-DSA-44, true, [verify, sign, decrypt])
|
||||
Pass Bad usages: generateKey(ML-DSA-44, true, [sign, verify, sign, sign, verify, decrypt])
|
||||
Pass Bad usages: generateKey(ML-DSA-44, true, [wrapKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-44, true, [sign, wrapKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-44, true, [verify, sign, wrapKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-44, true, [sign, verify, sign, sign, verify, wrapKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-44, true, [unwrapKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-44, true, [sign, unwrapKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-44, true, [verify, sign, unwrapKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-44, true, [sign, verify, sign, sign, verify, unwrapKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-44, true, [deriveKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-44, true, [sign, deriveKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-44, true, [verify, sign, deriveKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-44, true, [sign, verify, sign, sign, verify, deriveKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-44, true, [deriveBits])
|
||||
Pass Bad usages: generateKey(ML-DSA-44, true, [sign, deriveBits])
|
||||
Pass Bad usages: generateKey(ML-DSA-44, true, [verify, sign, deriveBits])
|
||||
Pass Bad usages: generateKey(ML-DSA-44, true, [sign, verify, sign, sign, verify, deriveBits])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-44}, true, [encrypt])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-44}, true, [sign, encrypt])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-44}, true, [verify, sign, encrypt])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-44}, true, [sign, verify, sign, sign, verify, encrypt])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-44}, true, [decrypt])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-44}, true, [sign, decrypt])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-44}, true, [verify, sign, decrypt])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-44}, true, [sign, verify, sign, sign, verify, decrypt])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-44}, true, [wrapKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-44}, true, [sign, wrapKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-44}, true, [verify, sign, wrapKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-44}, true, [sign, verify, sign, sign, verify, wrapKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-44}, true, [unwrapKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-44}, true, [sign, unwrapKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-44}, true, [verify, sign, unwrapKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-44}, true, [sign, verify, sign, sign, verify, unwrapKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-44}, true, [deriveKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-44}, true, [sign, deriveKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-44}, true, [verify, sign, deriveKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-44}, true, [sign, verify, sign, sign, verify, deriveKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-44}, true, [deriveBits])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-44}, true, [sign, deriveBits])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-44}, true, [verify, sign, deriveBits])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-44}, true, [sign, verify, sign, sign, verify, deriveBits])
|
||||
Pass Bad usages: generateKey(ML-DSA-65, true, [encrypt])
|
||||
Pass Bad usages: generateKey(ML-DSA-65, true, [sign, encrypt])
|
||||
Pass Bad usages: generateKey(ML-DSA-65, true, [verify, sign, encrypt])
|
||||
Pass Bad usages: generateKey(ML-DSA-65, true, [sign, verify, sign, sign, verify, encrypt])
|
||||
Pass Bad usages: generateKey(ML-DSA-65, true, [decrypt])
|
||||
Pass Bad usages: generateKey(ML-DSA-65, true, [sign, decrypt])
|
||||
Pass Bad usages: generateKey(ML-DSA-65, true, [verify, sign, decrypt])
|
||||
Pass Bad usages: generateKey(ML-DSA-65, true, [sign, verify, sign, sign, verify, decrypt])
|
||||
Pass Bad usages: generateKey(ML-DSA-65, true, [wrapKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-65, true, [sign, wrapKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-65, true, [verify, sign, wrapKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-65, true, [sign, verify, sign, sign, verify, wrapKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-65, true, [unwrapKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-65, true, [sign, unwrapKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-65, true, [verify, sign, unwrapKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-65, true, [sign, verify, sign, sign, verify, unwrapKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-65, true, [deriveKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-65, true, [sign, deriveKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-65, true, [verify, sign, deriveKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-65, true, [sign, verify, sign, sign, verify, deriveKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-65, true, [deriveBits])
|
||||
Pass Bad usages: generateKey(ML-DSA-65, true, [sign, deriveBits])
|
||||
Pass Bad usages: generateKey(ML-DSA-65, true, [verify, sign, deriveBits])
|
||||
Pass Bad usages: generateKey(ML-DSA-65, true, [sign, verify, sign, sign, verify, deriveBits])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-65}, true, [encrypt])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-65}, true, [sign, encrypt])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-65}, true, [verify, sign, encrypt])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-65}, true, [sign, verify, sign, sign, verify, encrypt])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-65}, true, [decrypt])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-65}, true, [sign, decrypt])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-65}, true, [verify, sign, decrypt])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-65}, true, [sign, verify, sign, sign, verify, decrypt])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-65}, true, [wrapKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-65}, true, [sign, wrapKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-65}, true, [verify, sign, wrapKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-65}, true, [sign, verify, sign, sign, verify, wrapKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-65}, true, [unwrapKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-65}, true, [sign, unwrapKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-65}, true, [verify, sign, unwrapKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-65}, true, [sign, verify, sign, sign, verify, unwrapKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-65}, true, [deriveKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-65}, true, [sign, deriveKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-65}, true, [verify, sign, deriveKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-65}, true, [sign, verify, sign, sign, verify, deriveKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-65}, true, [deriveBits])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-65}, true, [sign, deriveBits])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-65}, true, [verify, sign, deriveBits])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-65}, true, [sign, verify, sign, sign, verify, deriveBits])
|
||||
Pass Bad usages: generateKey(ML-DSA-87, true, [encrypt])
|
||||
Pass Bad usages: generateKey(ML-DSA-87, true, [sign, encrypt])
|
||||
Pass Bad usages: generateKey(ML-DSA-87, true, [verify, sign, encrypt])
|
||||
Pass Bad usages: generateKey(ML-DSA-87, true, [sign, verify, sign, sign, verify, encrypt])
|
||||
Pass Bad usages: generateKey(ML-DSA-87, true, [decrypt])
|
||||
Pass Bad usages: generateKey(ML-DSA-87, true, [sign, decrypt])
|
||||
Pass Bad usages: generateKey(ML-DSA-87, true, [verify, sign, decrypt])
|
||||
Pass Bad usages: generateKey(ML-DSA-87, true, [sign, verify, sign, sign, verify, decrypt])
|
||||
Pass Bad usages: generateKey(ML-DSA-87, true, [wrapKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-87, true, [sign, wrapKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-87, true, [verify, sign, wrapKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-87, true, [sign, verify, sign, sign, verify, wrapKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-87, true, [unwrapKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-87, true, [sign, unwrapKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-87, true, [verify, sign, unwrapKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-87, true, [sign, verify, sign, sign, verify, unwrapKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-87, true, [deriveKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-87, true, [sign, deriveKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-87, true, [verify, sign, deriveKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-87, true, [sign, verify, sign, sign, verify, deriveKey])
|
||||
Pass Bad usages: generateKey(ML-DSA-87, true, [deriveBits])
|
||||
Pass Bad usages: generateKey(ML-DSA-87, true, [sign, deriveBits])
|
||||
Pass Bad usages: generateKey(ML-DSA-87, true, [verify, sign, deriveBits])
|
||||
Pass Bad usages: generateKey(ML-DSA-87, true, [sign, verify, sign, sign, verify, deriveBits])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-87}, true, [encrypt])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-87}, true, [sign, encrypt])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-87}, true, [verify, sign, encrypt])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-87}, true, [sign, verify, sign, sign, verify, encrypt])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-87}, true, [decrypt])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-87}, true, [sign, decrypt])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-87}, true, [verify, sign, decrypt])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-87}, true, [sign, verify, sign, sign, verify, decrypt])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-87}, true, [wrapKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-87}, true, [sign, wrapKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-87}, true, [verify, sign, wrapKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-87}, true, [sign, verify, sign, sign, verify, wrapKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-87}, true, [unwrapKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-87}, true, [sign, unwrapKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-87}, true, [verify, sign, unwrapKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-87}, true, [sign, verify, sign, sign, verify, unwrapKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-87}, true, [deriveKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-87}, true, [sign, deriveKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-87}, true, [verify, sign, deriveKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-87}, true, [sign, verify, sign, sign, verify, deriveKey])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-87}, true, [deriveBits])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-87}, true, [sign, deriveBits])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-87}, true, [verify, sign, deriveBits])
|
||||
Pass Bad usages: generateKey({name: ML-DSA-87}, true, [sign, verify, sign, sign, verify, deriveBits])
|
||||
Pass Empty usages: generateKey(ML-DSA-44, false, [])
|
||||
Pass Empty usages: generateKey(ML-DSA-44, true, [])
|
||||
Pass Empty usages: generateKey({name: ML-DSA-44}, false, [])
|
||||
Pass Empty usages: generateKey({name: ML-DSA-44}, true, [])
|
||||
Pass Empty usages: generateKey(ML-DSA-65, false, [])
|
||||
Pass Empty usages: generateKey(ML-DSA-65, true, [])
|
||||
Pass Empty usages: generateKey({name: ML-DSA-65}, false, [])
|
||||
Pass Empty usages: generateKey({name: ML-DSA-65}, true, [])
|
||||
Pass Empty usages: generateKey(ML-DSA-87, false, [])
|
||||
Pass Empty usages: generateKey(ML-DSA-87, true, [])
|
||||
Pass Empty usages: generateKey({name: ML-DSA-87}, false, [])
|
||||
Pass Empty usages: generateKey({name: ML-DSA-87}, true, [])
|
||||
@@ -0,0 +1,113 @@
|
||||
Harness status: OK
|
||||
|
||||
Found 108 tests
|
||||
|
||||
108 Pass
|
||||
Pass Success: generateKey(ML-DSA-44, false, [sign])
|
||||
Pass Success: generateKey(ML-DSA-44, true, [sign])
|
||||
Pass Success: generateKey(ML-DSA-44, false, [verify, sign])
|
||||
Pass Success: generateKey(ML-DSA-44, true, [verify, sign])
|
||||
Pass Success: generateKey(ML-DSA-44, false, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey(ML-DSA-44, true, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey({name: ML-DSA-44}, false, [sign])
|
||||
Pass Success: generateKey({name: ML-DSA-44}, true, [sign])
|
||||
Pass Success: generateKey({name: ML-DSA-44}, false, [verify, sign])
|
||||
Pass Success: generateKey({name: ML-DSA-44}, true, [verify, sign])
|
||||
Pass Success: generateKey({name: ML-DSA-44}, false, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey({name: ML-DSA-44}, true, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey(ml-dsa-44, false, [sign])
|
||||
Pass Success: generateKey(ml-dsa-44, true, [sign])
|
||||
Pass Success: generateKey(ml-dsa-44, false, [verify, sign])
|
||||
Pass Success: generateKey(ml-dsa-44, true, [verify, sign])
|
||||
Pass Success: generateKey(ml-dsa-44, false, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey(ml-dsa-44, true, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey({name: ml-dsa-44}, false, [sign])
|
||||
Pass Success: generateKey({name: ml-dsa-44}, true, [sign])
|
||||
Pass Success: generateKey({name: ml-dsa-44}, false, [verify, sign])
|
||||
Pass Success: generateKey({name: ml-dsa-44}, true, [verify, sign])
|
||||
Pass Success: generateKey({name: ml-dsa-44}, false, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey({name: ml-dsa-44}, true, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey(Ml-dsa-44, false, [sign])
|
||||
Pass Success: generateKey(Ml-dsa-44, true, [sign])
|
||||
Pass Success: generateKey(Ml-dsa-44, false, [verify, sign])
|
||||
Pass Success: generateKey(Ml-dsa-44, true, [verify, sign])
|
||||
Pass Success: generateKey(Ml-dsa-44, false, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey(Ml-dsa-44, true, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey({name: Ml-dsa-44}, false, [sign])
|
||||
Pass Success: generateKey({name: Ml-dsa-44}, true, [sign])
|
||||
Pass Success: generateKey({name: Ml-dsa-44}, false, [verify, sign])
|
||||
Pass Success: generateKey({name: Ml-dsa-44}, true, [verify, sign])
|
||||
Pass Success: generateKey({name: Ml-dsa-44}, false, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey({name: Ml-dsa-44}, true, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey(ML-DSA-65, false, [sign])
|
||||
Pass Success: generateKey(ML-DSA-65, true, [sign])
|
||||
Pass Success: generateKey(ML-DSA-65, false, [verify, sign])
|
||||
Pass Success: generateKey(ML-DSA-65, true, [verify, sign])
|
||||
Pass Success: generateKey(ML-DSA-65, false, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey(ML-DSA-65, true, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey({name: ML-DSA-65}, false, [sign])
|
||||
Pass Success: generateKey({name: ML-DSA-65}, true, [sign])
|
||||
Pass Success: generateKey({name: ML-DSA-65}, false, [verify, sign])
|
||||
Pass Success: generateKey({name: ML-DSA-65}, true, [verify, sign])
|
||||
Pass Success: generateKey({name: ML-DSA-65}, false, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey({name: ML-DSA-65}, true, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey(ml-dsa-65, false, [sign])
|
||||
Pass Success: generateKey(ml-dsa-65, true, [sign])
|
||||
Pass Success: generateKey(ml-dsa-65, false, [verify, sign])
|
||||
Pass Success: generateKey(ml-dsa-65, true, [verify, sign])
|
||||
Pass Success: generateKey(ml-dsa-65, false, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey(ml-dsa-65, true, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey({name: ml-dsa-65}, false, [sign])
|
||||
Pass Success: generateKey({name: ml-dsa-65}, true, [sign])
|
||||
Pass Success: generateKey({name: ml-dsa-65}, false, [verify, sign])
|
||||
Pass Success: generateKey({name: ml-dsa-65}, true, [verify, sign])
|
||||
Pass Success: generateKey({name: ml-dsa-65}, false, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey({name: ml-dsa-65}, true, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey(Ml-dsa-65, false, [sign])
|
||||
Pass Success: generateKey(Ml-dsa-65, true, [sign])
|
||||
Pass Success: generateKey(Ml-dsa-65, false, [verify, sign])
|
||||
Pass Success: generateKey(Ml-dsa-65, true, [verify, sign])
|
||||
Pass Success: generateKey(Ml-dsa-65, false, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey(Ml-dsa-65, true, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey({name: Ml-dsa-65}, false, [sign])
|
||||
Pass Success: generateKey({name: Ml-dsa-65}, true, [sign])
|
||||
Pass Success: generateKey({name: Ml-dsa-65}, false, [verify, sign])
|
||||
Pass Success: generateKey({name: Ml-dsa-65}, true, [verify, sign])
|
||||
Pass Success: generateKey({name: Ml-dsa-65}, false, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey({name: Ml-dsa-65}, true, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey(ML-DSA-87, false, [sign])
|
||||
Pass Success: generateKey(ML-DSA-87, true, [sign])
|
||||
Pass Success: generateKey(ML-DSA-87, false, [verify, sign])
|
||||
Pass Success: generateKey(ML-DSA-87, true, [verify, sign])
|
||||
Pass Success: generateKey(ML-DSA-87, false, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey(ML-DSA-87, true, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey({name: ML-DSA-87}, false, [sign])
|
||||
Pass Success: generateKey({name: ML-DSA-87}, true, [sign])
|
||||
Pass Success: generateKey({name: ML-DSA-87}, false, [verify, sign])
|
||||
Pass Success: generateKey({name: ML-DSA-87}, true, [verify, sign])
|
||||
Pass Success: generateKey({name: ML-DSA-87}, false, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey({name: ML-DSA-87}, true, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey(ml-dsa-87, false, [sign])
|
||||
Pass Success: generateKey(ml-dsa-87, true, [sign])
|
||||
Pass Success: generateKey(ml-dsa-87, false, [verify, sign])
|
||||
Pass Success: generateKey(ml-dsa-87, true, [verify, sign])
|
||||
Pass Success: generateKey(ml-dsa-87, false, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey(ml-dsa-87, true, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey({name: ml-dsa-87}, false, [sign])
|
||||
Pass Success: generateKey({name: ml-dsa-87}, true, [sign])
|
||||
Pass Success: generateKey({name: ml-dsa-87}, false, [verify, sign])
|
||||
Pass Success: generateKey({name: ml-dsa-87}, true, [verify, sign])
|
||||
Pass Success: generateKey({name: ml-dsa-87}, false, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey({name: ml-dsa-87}, true, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey(Ml-dsa-87, false, [sign])
|
||||
Pass Success: generateKey(Ml-dsa-87, true, [sign])
|
||||
Pass Success: generateKey(Ml-dsa-87, false, [verify, sign])
|
||||
Pass Success: generateKey(Ml-dsa-87, true, [verify, sign])
|
||||
Pass Success: generateKey(Ml-dsa-87, false, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey(Ml-dsa-87, true, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey({name: Ml-dsa-87}, false, [sign])
|
||||
Pass Success: generateKey({name: Ml-dsa-87}, true, [sign])
|
||||
Pass Success: generateKey({name: Ml-dsa-87}, false, [verify, sign])
|
||||
Pass Success: generateKey({name: Ml-dsa-87}, true, [verify, sign])
|
||||
Pass Success: generateKey({name: Ml-dsa-87}, false, [sign, verify, sign, sign, verify])
|
||||
Pass Success: generateKey({name: Ml-dsa-87}, true, [sign, verify, sign, sign, verify])
|
||||
Reference in New Issue
Block a user