mirror of
https://github.com/LadybirdBrowser/ladybird
synced 2026-04-26 01:35:08 +02:00
LibWeb: Import KMAC WPT tests
This commit is contained in:
committed by
Jelle Raaijmakers
parent
915fc4602b
commit
6cc575b8a9
Notes:
github-actions[bot]
2026-03-19 09:48:04 +00:00
Author: https://github.com/mikiubo Commit: https://github.com/LadybirdBrowser/ladybird/commit/6cc575b8a9c Pull-request: https://github.com/LadybirdBrowser/ladybird/pull/8445 Reviewed-by: https://github.com/gmta ✅
@@ -0,0 +1,558 @@
|
||||
Harness status: OK
|
||||
|
||||
Found 552 tests
|
||||
|
||||
360 Pass
|
||||
192 Fail
|
||||
Pass Bad algorithm: generateKey(AES, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, false, [sign])
|
||||
Pass Bad algorithm: generateKey(AES, true, [sign])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [sign])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [sign])
|
||||
Pass Bad algorithm: generateKey(AES, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey(AES, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey(AES, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey(AES, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey(AES, false, [])
|
||||
Pass Bad algorithm: generateKey(AES, true, [])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [])
|
||||
Pass Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [sign])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [sign])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [sign])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [sign])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Empty algorithm: generateKey({}, false, [decrypt])
|
||||
Pass Empty algorithm: generateKey({}, true, [decrypt])
|
||||
Pass Empty algorithm: generateKey({}, RED, [decrypt])
|
||||
Pass Empty algorithm: generateKey({}, 7, [decrypt])
|
||||
Pass Empty algorithm: generateKey({}, false, [sign, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, true, [sign, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, RED, [sign, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, 7, [sign, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, false, [deriveBits, sign, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, true, [deriveBits, sign, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, false, [deriveBits, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, true, [deriveBits, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, RED, [deriveBits, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, 7, [deriveBits, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, false, [sign])
|
||||
Pass Empty algorithm: generateKey({}, true, [sign])
|
||||
Pass Empty algorithm: generateKey({}, RED, [sign])
|
||||
Pass Empty algorithm: generateKey({}, 7, [sign])
|
||||
Pass Empty algorithm: generateKey({}, false, [deriveBits, sign])
|
||||
Pass Empty algorithm: generateKey({}, true, [deriveBits, sign])
|
||||
Pass Empty algorithm: generateKey({}, RED, [deriveBits, sign])
|
||||
Pass Empty algorithm: generateKey({}, 7, [deriveBits, sign])
|
||||
Pass Empty algorithm: generateKey({}, false, [deriveBits])
|
||||
Pass Empty algorithm: generateKey({}, true, [deriveBits])
|
||||
Pass Empty algorithm: generateKey({}, RED, [deriveBits])
|
||||
Pass Empty algorithm: generateKey({}, 7, [deriveBits])
|
||||
Pass Empty algorithm: generateKey({}, false, [])
|
||||
Pass Empty algorithm: generateKey({}, true, [])
|
||||
Pass Empty algorithm: generateKey({}, RED, [])
|
||||
Pass Empty algorithm: generateKey({}, 7, [])
|
||||
Pass Empty algorithm: generateKey({}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Empty algorithm: generateKey({}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Empty algorithm: generateKey({}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Empty algorithm: generateKey({}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [encrypt])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [sign, encrypt])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [verify, sign, encrypt])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [verify, encrypt])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [sign, verify, sign, verify, encrypt])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [decrypt])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [sign, decrypt])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [verify, sign, decrypt])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [verify, decrypt])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [sign, verify, sign, verify, decrypt])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [wrapKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [sign, wrapKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [verify, sign, wrapKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [verify, wrapKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [sign, verify, sign, verify, wrapKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [sign, unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [verify, sign, unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [verify, unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [sign, verify, sign, verify, unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [deriveKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [sign, deriveKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [verify, sign, deriveKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [verify, deriveKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [sign, verify, sign, verify, deriveKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [deriveBits])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [sign, deriveBits])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [verify, sign, deriveBits])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [verify, deriveBits])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC128}, true, [sign, verify, sign, verify, deriveBits])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [encrypt])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [sign, encrypt])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [verify, sign, encrypt])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [verify, encrypt])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [sign, verify, sign, verify, encrypt])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [decrypt])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [sign, decrypt])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [verify, sign, decrypt])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [verify, decrypt])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [sign, verify, sign, verify, decrypt])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [wrapKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [sign, wrapKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [verify, sign, wrapKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [verify, wrapKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [sign, verify, sign, verify, wrapKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [sign, unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [verify, sign, unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [verify, unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [sign, verify, sign, verify, unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [deriveKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [sign, deriveKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [verify, sign, deriveKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [verify, deriveKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [sign, verify, sign, verify, deriveKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [deriveBits])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [sign, deriveBits])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [verify, sign, deriveBits])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [verify, deriveBits])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC128}, true, [sign, verify, sign, verify, deriveBits])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [encrypt])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [sign, encrypt])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [verify, sign, encrypt])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [verify, encrypt])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [sign, verify, sign, verify, encrypt])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [decrypt])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [sign, decrypt])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [verify, sign, decrypt])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [verify, decrypt])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [sign, verify, sign, verify, decrypt])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [wrapKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [sign, wrapKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [verify, sign, wrapKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [verify, wrapKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [sign, verify, sign, verify, wrapKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [sign, unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [verify, sign, unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [verify, unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [sign, verify, sign, verify, unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [deriveKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [sign, deriveKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [verify, sign, deriveKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [verify, deriveKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [sign, verify, sign, verify, deriveKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [deriveBits])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [sign, deriveBits])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [verify, sign, deriveBits])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [verify, deriveBits])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC128}, true, [sign, verify, sign, verify, deriveBits])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [encrypt])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [sign, encrypt])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [verify, sign, encrypt])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [verify, encrypt])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [sign, verify, sign, verify, encrypt])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [decrypt])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [sign, decrypt])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [verify, sign, decrypt])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [verify, decrypt])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [sign, verify, sign, verify, decrypt])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [wrapKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [sign, wrapKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [verify, sign, wrapKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [verify, wrapKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [sign, verify, sign, verify, wrapKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [sign, unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [verify, sign, unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [verify, unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [sign, verify, sign, verify, unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [deriveKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [sign, deriveKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [verify, sign, deriveKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [verify, deriveKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [sign, verify, sign, verify, deriveKey])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [deriveBits])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [sign, deriveBits])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [verify, sign, deriveBits])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [verify, deriveBits])
|
||||
Fail Bad usages: generateKey({length: 128, name: KMAC256}, true, [sign, verify, sign, verify, deriveBits])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [encrypt])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [sign, encrypt])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [verify, sign, encrypt])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [verify, encrypt])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [sign, verify, sign, verify, encrypt])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [decrypt])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [sign, decrypt])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [verify, sign, decrypt])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [verify, decrypt])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [sign, verify, sign, verify, decrypt])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [wrapKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [sign, wrapKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [verify, sign, wrapKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [verify, wrapKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [sign, verify, sign, verify, wrapKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [sign, unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [verify, sign, unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [verify, unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [sign, verify, sign, verify, unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [deriveKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [sign, deriveKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [verify, sign, deriveKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [verify, deriveKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [sign, verify, sign, verify, deriveKey])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [deriveBits])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [sign, deriveBits])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [verify, sign, deriveBits])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [verify, deriveBits])
|
||||
Fail Bad usages: generateKey({length: 160, name: KMAC256}, true, [sign, verify, sign, verify, deriveBits])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [encrypt])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [sign, encrypt])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [verify, sign, encrypt])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [verify, encrypt])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [sign, verify, sign, verify, encrypt])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [decrypt])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [sign, decrypt])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [verify, sign, decrypt])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [verify, decrypt])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [sign, verify, sign, verify, decrypt])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [wrapKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [sign, wrapKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [verify, sign, wrapKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [verify, wrapKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [sign, verify, sign, verify, wrapKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [sign, unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [verify, sign, unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [verify, unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [sign, verify, sign, verify, unwrapKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [deriveKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [sign, deriveKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [verify, sign, deriveKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [verify, deriveKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [sign, verify, sign, verify, deriveKey])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [deriveBits])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [sign, deriveBits])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [verify, sign, deriveBits])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [verify, deriveBits])
|
||||
Fail Bad usages: generateKey({length: 256, name: KMAC256}, true, [sign, verify, sign, verify, deriveBits])
|
||||
Fail Empty usages: generateKey({length: 128, name: KMAC128}, false, [])
|
||||
Fail Empty usages: generateKey({length: 128, name: KMAC128}, true, [])
|
||||
Fail Empty usages: generateKey({length: 160, name: KMAC128}, false, [])
|
||||
Fail Empty usages: generateKey({length: 160, name: KMAC128}, true, [])
|
||||
Fail Empty usages: generateKey({length: 256, name: KMAC128}, false, [])
|
||||
Fail Empty usages: generateKey({length: 256, name: KMAC128}, true, [])
|
||||
Fail Empty usages: generateKey({length: 128, name: KMAC256}, false, [])
|
||||
Fail Empty usages: generateKey({length: 128, name: KMAC256}, true, [])
|
||||
Fail Empty usages: generateKey({length: 160, name: KMAC256}, false, [])
|
||||
Fail Empty usages: generateKey({length: 160, name: KMAC256}, true, [])
|
||||
Fail Empty usages: generateKey({length: 256, name: KMAC256}, false, [])
|
||||
Fail Empty usages: generateKey({length: 256, name: KMAC256}, true, [])
|
||||
@@ -0,0 +1,149 @@
|
||||
Harness status: OK
|
||||
|
||||
Found 144 tests
|
||||
|
||||
144 Fail
|
||||
Fail Success: generateKey({length: 128, name: KMAC128}, false, [sign])
|
||||
Fail Success: generateKey({length: 128, name: KMAC128}, true, [sign])
|
||||
Fail Success: generateKey({length: 128, name: KMAC128}, false, [verify, sign])
|
||||
Fail Success: generateKey({length: 128, name: KMAC128}, true, [verify, sign])
|
||||
Fail Success: generateKey({length: 128, name: KMAC128}, false, [verify])
|
||||
Fail Success: generateKey({length: 128, name: KMAC128}, true, [verify])
|
||||
Fail Success: generateKey({length: 128, name: KMAC128}, false, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 128, name: KMAC128}, true, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 160, name: KMAC128}, false, [sign])
|
||||
Fail Success: generateKey({length: 160, name: KMAC128}, true, [sign])
|
||||
Fail Success: generateKey({length: 160, name: KMAC128}, false, [verify, sign])
|
||||
Fail Success: generateKey({length: 160, name: KMAC128}, true, [verify, sign])
|
||||
Fail Success: generateKey({length: 160, name: KMAC128}, false, [verify])
|
||||
Fail Success: generateKey({length: 160, name: KMAC128}, true, [verify])
|
||||
Fail Success: generateKey({length: 160, name: KMAC128}, false, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 160, name: KMAC128}, true, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 256, name: KMAC128}, false, [sign])
|
||||
Fail Success: generateKey({length: 256, name: KMAC128}, true, [sign])
|
||||
Fail Success: generateKey({length: 256, name: KMAC128}, false, [verify, sign])
|
||||
Fail Success: generateKey({length: 256, name: KMAC128}, true, [verify, sign])
|
||||
Fail Success: generateKey({length: 256, name: KMAC128}, false, [verify])
|
||||
Fail Success: generateKey({length: 256, name: KMAC128}, true, [verify])
|
||||
Fail Success: generateKey({length: 256, name: KMAC128}, false, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 256, name: KMAC128}, true, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 128, name: kmac128}, false, [sign])
|
||||
Fail Success: generateKey({length: 128, name: kmac128}, true, [sign])
|
||||
Fail Success: generateKey({length: 128, name: kmac128}, false, [verify, sign])
|
||||
Fail Success: generateKey({length: 128, name: kmac128}, true, [verify, sign])
|
||||
Fail Success: generateKey({length: 128, name: kmac128}, false, [verify])
|
||||
Fail Success: generateKey({length: 128, name: kmac128}, true, [verify])
|
||||
Fail Success: generateKey({length: 128, name: kmac128}, false, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 128, name: kmac128}, true, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 160, name: kmac128}, false, [sign])
|
||||
Fail Success: generateKey({length: 160, name: kmac128}, true, [sign])
|
||||
Fail Success: generateKey({length: 160, name: kmac128}, false, [verify, sign])
|
||||
Fail Success: generateKey({length: 160, name: kmac128}, true, [verify, sign])
|
||||
Fail Success: generateKey({length: 160, name: kmac128}, false, [verify])
|
||||
Fail Success: generateKey({length: 160, name: kmac128}, true, [verify])
|
||||
Fail Success: generateKey({length: 160, name: kmac128}, false, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 160, name: kmac128}, true, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 256, name: kmac128}, false, [sign])
|
||||
Fail Success: generateKey({length: 256, name: kmac128}, true, [sign])
|
||||
Fail Success: generateKey({length: 256, name: kmac128}, false, [verify, sign])
|
||||
Fail Success: generateKey({length: 256, name: kmac128}, true, [verify, sign])
|
||||
Fail Success: generateKey({length: 256, name: kmac128}, false, [verify])
|
||||
Fail Success: generateKey({length: 256, name: kmac128}, true, [verify])
|
||||
Fail Success: generateKey({length: 256, name: kmac128}, false, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 256, name: kmac128}, true, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 128, name: Kmac128}, false, [sign])
|
||||
Fail Success: generateKey({length: 128, name: Kmac128}, true, [sign])
|
||||
Fail Success: generateKey({length: 128, name: Kmac128}, false, [verify, sign])
|
||||
Fail Success: generateKey({length: 128, name: Kmac128}, true, [verify, sign])
|
||||
Fail Success: generateKey({length: 128, name: Kmac128}, false, [verify])
|
||||
Fail Success: generateKey({length: 128, name: Kmac128}, true, [verify])
|
||||
Fail Success: generateKey({length: 128, name: Kmac128}, false, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 128, name: Kmac128}, true, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 160, name: Kmac128}, false, [sign])
|
||||
Fail Success: generateKey({length: 160, name: Kmac128}, true, [sign])
|
||||
Fail Success: generateKey({length: 160, name: Kmac128}, false, [verify, sign])
|
||||
Fail Success: generateKey({length: 160, name: Kmac128}, true, [verify, sign])
|
||||
Fail Success: generateKey({length: 160, name: Kmac128}, false, [verify])
|
||||
Fail Success: generateKey({length: 160, name: Kmac128}, true, [verify])
|
||||
Fail Success: generateKey({length: 160, name: Kmac128}, false, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 160, name: Kmac128}, true, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 256, name: Kmac128}, false, [sign])
|
||||
Fail Success: generateKey({length: 256, name: Kmac128}, true, [sign])
|
||||
Fail Success: generateKey({length: 256, name: Kmac128}, false, [verify, sign])
|
||||
Fail Success: generateKey({length: 256, name: Kmac128}, true, [verify, sign])
|
||||
Fail Success: generateKey({length: 256, name: Kmac128}, false, [verify])
|
||||
Fail Success: generateKey({length: 256, name: Kmac128}, true, [verify])
|
||||
Fail Success: generateKey({length: 256, name: Kmac128}, false, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 256, name: Kmac128}, true, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 128, name: KMAC256}, false, [sign])
|
||||
Fail Success: generateKey({length: 128, name: KMAC256}, true, [sign])
|
||||
Fail Success: generateKey({length: 128, name: KMAC256}, false, [verify, sign])
|
||||
Fail Success: generateKey({length: 128, name: KMAC256}, true, [verify, sign])
|
||||
Fail Success: generateKey({length: 128, name: KMAC256}, false, [verify])
|
||||
Fail Success: generateKey({length: 128, name: KMAC256}, true, [verify])
|
||||
Fail Success: generateKey({length: 128, name: KMAC256}, false, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 128, name: KMAC256}, true, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 160, name: KMAC256}, false, [sign])
|
||||
Fail Success: generateKey({length: 160, name: KMAC256}, true, [sign])
|
||||
Fail Success: generateKey({length: 160, name: KMAC256}, false, [verify, sign])
|
||||
Fail Success: generateKey({length: 160, name: KMAC256}, true, [verify, sign])
|
||||
Fail Success: generateKey({length: 160, name: KMAC256}, false, [verify])
|
||||
Fail Success: generateKey({length: 160, name: KMAC256}, true, [verify])
|
||||
Fail Success: generateKey({length: 160, name: KMAC256}, false, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 160, name: KMAC256}, true, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 256, name: KMAC256}, false, [sign])
|
||||
Fail Success: generateKey({length: 256, name: KMAC256}, true, [sign])
|
||||
Fail Success: generateKey({length: 256, name: KMAC256}, false, [verify, sign])
|
||||
Fail Success: generateKey({length: 256, name: KMAC256}, true, [verify, sign])
|
||||
Fail Success: generateKey({length: 256, name: KMAC256}, false, [verify])
|
||||
Fail Success: generateKey({length: 256, name: KMAC256}, true, [verify])
|
||||
Fail Success: generateKey({length: 256, name: KMAC256}, false, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 256, name: KMAC256}, true, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 128, name: kmac256}, false, [sign])
|
||||
Fail Success: generateKey({length: 128, name: kmac256}, true, [sign])
|
||||
Fail Success: generateKey({length: 128, name: kmac256}, false, [verify, sign])
|
||||
Fail Success: generateKey({length: 128, name: kmac256}, true, [verify, sign])
|
||||
Fail Success: generateKey({length: 128, name: kmac256}, false, [verify])
|
||||
Fail Success: generateKey({length: 128, name: kmac256}, true, [verify])
|
||||
Fail Success: generateKey({length: 128, name: kmac256}, false, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 128, name: kmac256}, true, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 160, name: kmac256}, false, [sign])
|
||||
Fail Success: generateKey({length: 160, name: kmac256}, true, [sign])
|
||||
Fail Success: generateKey({length: 160, name: kmac256}, false, [verify, sign])
|
||||
Fail Success: generateKey({length: 160, name: kmac256}, true, [verify, sign])
|
||||
Fail Success: generateKey({length: 160, name: kmac256}, false, [verify])
|
||||
Fail Success: generateKey({length: 160, name: kmac256}, true, [verify])
|
||||
Fail Success: generateKey({length: 160, name: kmac256}, false, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 160, name: kmac256}, true, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 256, name: kmac256}, false, [sign])
|
||||
Fail Success: generateKey({length: 256, name: kmac256}, true, [sign])
|
||||
Fail Success: generateKey({length: 256, name: kmac256}, false, [verify, sign])
|
||||
Fail Success: generateKey({length: 256, name: kmac256}, true, [verify, sign])
|
||||
Fail Success: generateKey({length: 256, name: kmac256}, false, [verify])
|
||||
Fail Success: generateKey({length: 256, name: kmac256}, true, [verify])
|
||||
Fail Success: generateKey({length: 256, name: kmac256}, false, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 256, name: kmac256}, true, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 128, name: Kmac256}, false, [sign])
|
||||
Fail Success: generateKey({length: 128, name: Kmac256}, true, [sign])
|
||||
Fail Success: generateKey({length: 128, name: Kmac256}, false, [verify, sign])
|
||||
Fail Success: generateKey({length: 128, name: Kmac256}, true, [verify, sign])
|
||||
Fail Success: generateKey({length: 128, name: Kmac256}, false, [verify])
|
||||
Fail Success: generateKey({length: 128, name: Kmac256}, true, [verify])
|
||||
Fail Success: generateKey({length: 128, name: Kmac256}, false, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 128, name: Kmac256}, true, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 160, name: Kmac256}, false, [sign])
|
||||
Fail Success: generateKey({length: 160, name: Kmac256}, true, [sign])
|
||||
Fail Success: generateKey({length: 160, name: Kmac256}, false, [verify, sign])
|
||||
Fail Success: generateKey({length: 160, name: Kmac256}, true, [verify, sign])
|
||||
Fail Success: generateKey({length: 160, name: Kmac256}, false, [verify])
|
||||
Fail Success: generateKey({length: 160, name: Kmac256}, true, [verify])
|
||||
Fail Success: generateKey({length: 160, name: Kmac256}, false, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 160, name: Kmac256}, true, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 256, name: Kmac256}, false, [sign])
|
||||
Fail Success: generateKey({length: 256, name: Kmac256}, true, [sign])
|
||||
Fail Success: generateKey({length: 256, name: Kmac256}, false, [verify, sign])
|
||||
Fail Success: generateKey({length: 256, name: Kmac256}, true, [verify, sign])
|
||||
Fail Success: generateKey({length: 256, name: Kmac256}, false, [verify])
|
||||
Fail Success: generateKey({length: 256, name: Kmac256}, true, [verify])
|
||||
Fail Success: generateKey({length: 256, name: Kmac256}, false, [sign, verify, sign, verify])
|
||||
Fail Success: generateKey({length: 256, name: Kmac256}, true, [sign, verify, sign, verify])
|
||||
@@ -0,0 +1,125 @@
|
||||
Harness status: OK
|
||||
|
||||
Found 120 tests
|
||||
|
||||
120 Fail
|
||||
Fail Good parameters: 128 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, true, [sign])
|
||||
Fail Good parameters: 128 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, true, [verify, sign])
|
||||
Fail Good parameters: 128 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, true, [verify])
|
||||
Fail Good parameters: 128 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, true, [sign, verify, sign, verify])
|
||||
Fail Empty Usages: 128 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, true, [])
|
||||
Fail Good parameters: 128 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: KMAC128}, true, [sign])
|
||||
Fail Good parameters: 128 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: KMAC128}, true, [verify, sign])
|
||||
Fail Good parameters: 128 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: KMAC128}, true, [verify])
|
||||
Fail Good parameters: 128 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: KMAC128}, true, [sign, verify, sign, verify])
|
||||
Fail Empty Usages: 128 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: KMAC128}, true, [])
|
||||
Fail Good parameters: 128 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, false, [sign])
|
||||
Fail Good parameters: 128 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, false, [verify, sign])
|
||||
Fail Good parameters: 128 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, false, [verify])
|
||||
Fail Good parameters: 128 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, false, [sign, verify, sign, verify])
|
||||
Fail Empty Usages: 128 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, false, [])
|
||||
Fail Good parameters: 128 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: KMAC128}, false, [sign])
|
||||
Fail Good parameters: 128 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: KMAC128}, false, [verify, sign])
|
||||
Fail Good parameters: 128 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: KMAC128}, false, [verify])
|
||||
Fail Good parameters: 128 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: KMAC128}, false, [sign, verify, sign, verify])
|
||||
Fail Empty Usages: 128 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: KMAC128}, false, [])
|
||||
Fail Good parameters: 192 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, true, [sign])
|
||||
Fail Good parameters: 192 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, true, [verify, sign])
|
||||
Fail Good parameters: 192 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, true, [verify])
|
||||
Fail Good parameters: 192 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, true, [sign, verify, sign, verify])
|
||||
Fail Empty Usages: 192 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, true, [])
|
||||
Fail Good parameters: 192 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: KMAC128}, true, [sign])
|
||||
Fail Good parameters: 192 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: KMAC128}, true, [verify, sign])
|
||||
Fail Good parameters: 192 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: KMAC128}, true, [verify])
|
||||
Fail Good parameters: 192 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: KMAC128}, true, [sign, verify, sign, verify])
|
||||
Fail Empty Usages: 192 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: KMAC128}, true, [])
|
||||
Fail Good parameters: 192 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, false, [sign])
|
||||
Fail Good parameters: 192 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, false, [verify, sign])
|
||||
Fail Good parameters: 192 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, false, [verify])
|
||||
Fail Good parameters: 192 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, false, [sign, verify, sign, verify])
|
||||
Fail Empty Usages: 192 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, false, [])
|
||||
Fail Good parameters: 192 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: KMAC128}, false, [sign])
|
||||
Fail Good parameters: 192 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: KMAC128}, false, [verify, sign])
|
||||
Fail Good parameters: 192 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: KMAC128}, false, [verify])
|
||||
Fail Good parameters: 192 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: KMAC128}, false, [sign, verify, sign, verify])
|
||||
Fail Empty Usages: 192 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: KMAC128}, false, [])
|
||||
Fail Good parameters: 256 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, true, [sign])
|
||||
Fail Good parameters: 256 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, true, [verify, sign])
|
||||
Fail Good parameters: 256 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, true, [verify])
|
||||
Fail Good parameters: 256 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, true, [sign, verify, sign, verify])
|
||||
Fail Empty Usages: 256 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, true, [])
|
||||
Fail Good parameters: 256 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: KMAC128}, true, [sign])
|
||||
Fail Good parameters: 256 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: KMAC128}, true, [verify, sign])
|
||||
Fail Good parameters: 256 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: KMAC128}, true, [verify])
|
||||
Fail Good parameters: 256 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: KMAC128}, true, [sign, verify, sign, verify])
|
||||
Fail Empty Usages: 256 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: KMAC128}, true, [])
|
||||
Fail Good parameters: 256 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, false, [sign])
|
||||
Fail Good parameters: 256 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, false, [verify, sign])
|
||||
Fail Good parameters: 256 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, false, [verify])
|
||||
Fail Good parameters: 256 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, false, [sign, verify, sign, verify])
|
||||
Fail Empty Usages: 256 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC128}, false, [])
|
||||
Fail Good parameters: 256 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: KMAC128}, false, [sign])
|
||||
Fail Good parameters: 256 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: KMAC128}, false, [verify, sign])
|
||||
Fail Good parameters: 256 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: KMAC128}, false, [verify])
|
||||
Fail Good parameters: 256 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: KMAC128}, false, [sign, verify, sign, verify])
|
||||
Fail Empty Usages: 256 bits (jwk, {alg: K128, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: KMAC128}, false, [])
|
||||
Fail Good parameters: 128 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, true, [sign])
|
||||
Fail Good parameters: 128 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, true, [verify, sign])
|
||||
Fail Good parameters: 128 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, true, [verify])
|
||||
Fail Good parameters: 128 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, true, [sign, verify, sign, verify])
|
||||
Fail Empty Usages: 128 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, true, [])
|
||||
Fail Good parameters: 128 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: KMAC256}, true, [sign])
|
||||
Fail Good parameters: 128 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: KMAC256}, true, [verify, sign])
|
||||
Fail Good parameters: 128 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: KMAC256}, true, [verify])
|
||||
Fail Good parameters: 128 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: KMAC256}, true, [sign, verify, sign, verify])
|
||||
Fail Empty Usages: 128 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: KMAC256}, true, [])
|
||||
Fail Good parameters: 128 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, false, [sign])
|
||||
Fail Good parameters: 128 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, false, [verify, sign])
|
||||
Fail Good parameters: 128 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, false, [verify])
|
||||
Fail Good parameters: 128 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, false, [sign, verify, sign, verify])
|
||||
Fail Empty Usages: 128 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, false, [])
|
||||
Fail Good parameters: 128 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: KMAC256}, false, [sign])
|
||||
Fail Good parameters: 128 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: KMAC256}, false, [verify, sign])
|
||||
Fail Good parameters: 128 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: KMAC256}, false, [verify])
|
||||
Fail Good parameters: 128 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: KMAC256}, false, [sign, verify, sign, verify])
|
||||
Fail Empty Usages: 128 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: KMAC256}, false, [])
|
||||
Fail Good parameters: 192 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, true, [sign])
|
||||
Fail Good parameters: 192 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, true, [verify, sign])
|
||||
Fail Good parameters: 192 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, true, [verify])
|
||||
Fail Good parameters: 192 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, true, [sign, verify, sign, verify])
|
||||
Fail Empty Usages: 192 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, true, [])
|
||||
Fail Good parameters: 192 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: KMAC256}, true, [sign])
|
||||
Fail Good parameters: 192 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: KMAC256}, true, [verify, sign])
|
||||
Fail Good parameters: 192 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: KMAC256}, true, [verify])
|
||||
Fail Good parameters: 192 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: KMAC256}, true, [sign, verify, sign, verify])
|
||||
Fail Empty Usages: 192 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: KMAC256}, true, [])
|
||||
Fail Good parameters: 192 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, false, [sign])
|
||||
Fail Good parameters: 192 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, false, [verify, sign])
|
||||
Fail Good parameters: 192 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, false, [verify])
|
||||
Fail Good parameters: 192 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, false, [sign, verify, sign, verify])
|
||||
Fail Empty Usages: 192 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, false, [])
|
||||
Fail Good parameters: 192 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: KMAC256}, false, [sign])
|
||||
Fail Good parameters: 192 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: KMAC256}, false, [verify, sign])
|
||||
Fail Good parameters: 192 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: KMAC256}, false, [verify])
|
||||
Fail Good parameters: 192 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: KMAC256}, false, [sign, verify, sign, verify])
|
||||
Fail Empty Usages: 192 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: KMAC256}, false, [])
|
||||
Fail Good parameters: 256 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, true, [sign])
|
||||
Fail Good parameters: 256 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, true, [verify, sign])
|
||||
Fail Good parameters: 256 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, true, [verify])
|
||||
Fail Good parameters: 256 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, true, [sign, verify, sign, verify])
|
||||
Fail Empty Usages: 256 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, true, [])
|
||||
Fail Good parameters: 256 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: KMAC256}, true, [sign])
|
||||
Fail Good parameters: 256 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: KMAC256}, true, [verify, sign])
|
||||
Fail Good parameters: 256 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: KMAC256}, true, [verify])
|
||||
Fail Good parameters: 256 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: KMAC256}, true, [sign, verify, sign, verify])
|
||||
Fail Empty Usages: 256 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: KMAC256}, true, [])
|
||||
Fail Good parameters: 256 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, false, [sign])
|
||||
Fail Good parameters: 256 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, false, [verify, sign])
|
||||
Fail Good parameters: 256 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, false, [verify])
|
||||
Fail Good parameters: 256 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, false, [sign, verify, sign, verify])
|
||||
Fail Empty Usages: 256 bits (raw-secret, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: KMAC256}, false, [])
|
||||
Fail Good parameters: 256 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: KMAC256}, false, [sign])
|
||||
Fail Good parameters: 256 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: KMAC256}, false, [verify, sign])
|
||||
Fail Good parameters: 256 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: KMAC256}, false, [verify])
|
||||
Fail Good parameters: 256 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: KMAC256}, false, [sign, verify, sign, verify])
|
||||
Fail Empty Usages: 256 bits (jwk, {alg: K256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: KMAC256}, false, [])
|
||||
@@ -0,0 +1,109 @@
|
||||
Harness status: OK
|
||||
|
||||
Found 103 tests
|
||||
|
||||
1 Pass
|
||||
102 Fail
|
||||
Pass setup
|
||||
Fail importVectorKeys step: KMAC128 with no customization verification
|
||||
Fail importVectorKeys step: KMAC128 with customization verification
|
||||
Fail importVectorKeys step: KMAC128 with large data and customization verification
|
||||
Fail importVectorKeys step: KMAC256 with customization and 512-bit output verification
|
||||
Fail importVectorKeys step: KMAC256 with large data and no customization verification
|
||||
Fail importVectorKeys step: KMAC256 with large data and customization verification
|
||||
Fail importVectorKeys step: KMAC128 with no customization verification with altered signature during call
|
||||
Fail importVectorKeys step: KMAC128 with customization verification with altered signature during call
|
||||
Fail importVectorKeys step: KMAC128 with large data and customization verification with altered signature during call
|
||||
Fail importVectorKeys step: KMAC256 with customization and 512-bit output verification with altered signature during call
|
||||
Fail importVectorKeys step: KMAC256 with large data and no customization verification with altered signature during call
|
||||
Fail importVectorKeys step: KMAC256 with large data and customization verification with altered signature during call
|
||||
Fail importVectorKeys step: KMAC128 with no customization verification with altered signature after call
|
||||
Fail importVectorKeys step: KMAC128 with customization verification with altered signature after call
|
||||
Fail importVectorKeys step: KMAC128 with large data and customization verification with altered signature after call
|
||||
Fail importVectorKeys step: KMAC256 with customization and 512-bit output verification with altered signature after call
|
||||
Fail importVectorKeys step: KMAC256 with large data and no customization verification with altered signature after call
|
||||
Fail importVectorKeys step: KMAC256 with large data and customization verification with altered signature after call
|
||||
Fail importVectorKeys step: KMAC128 with no customization verification with transferred signature during call
|
||||
Fail importVectorKeys step: KMAC128 with customization verification with transferred signature during call
|
||||
Fail importVectorKeys step: KMAC128 with large data and customization verification with transferred signature during call
|
||||
Fail importVectorKeys step: KMAC256 with customization and 512-bit output verification with transferred signature during call
|
||||
Fail importVectorKeys step: KMAC256 with large data and no customization verification with transferred signature during call
|
||||
Fail importVectorKeys step: KMAC256 with large data and customization verification with transferred signature during call
|
||||
Fail importVectorKeys step: KMAC128 with no customization verification with transferred signature after call
|
||||
Fail importVectorKeys step: KMAC128 with customization verification with transferred signature after call
|
||||
Fail importVectorKeys step: KMAC128 with large data and customization verification with transferred signature after call
|
||||
Fail importVectorKeys step: KMAC256 with customization and 512-bit output verification with transferred signature after call
|
||||
Fail importVectorKeys step: KMAC256 with large data and no customization verification with transferred signature after call
|
||||
Fail importVectorKeys step: KMAC256 with large data and customization verification with transferred signature after call
|
||||
Fail importVectorKeys step: KMAC128 with no customization with altered plaintext during call
|
||||
Fail importVectorKeys step: KMAC128 with customization with altered plaintext during call
|
||||
Fail importVectorKeys step: KMAC128 with large data and customization with altered plaintext during call
|
||||
Fail importVectorKeys step: KMAC256 with customization and 512-bit output with altered plaintext during call
|
||||
Fail importVectorKeys step: KMAC256 with large data and no customization with altered plaintext during call
|
||||
Fail importVectorKeys step: KMAC256 with large data and customization with altered plaintext during call
|
||||
Fail importVectorKeys step: KMAC128 with no customization with altered plaintext after call
|
||||
Fail importVectorKeys step: KMAC128 with customization with altered plaintext after call
|
||||
Fail importVectorKeys step: KMAC128 with large data and customization with altered plaintext after call
|
||||
Fail importVectorKeys step: KMAC256 with customization and 512-bit output with altered plaintext after call
|
||||
Fail importVectorKeys step: KMAC256 with large data and no customization with altered plaintext after call
|
||||
Fail importVectorKeys step: KMAC256 with large data and customization with altered plaintext after call
|
||||
Fail importVectorKeys step: KMAC128 with no customization with transferred plaintext during call
|
||||
Fail importVectorKeys step: KMAC128 with customization with transferred plaintext during call
|
||||
Fail importVectorKeys step: KMAC128 with large data and customization with transferred plaintext during call
|
||||
Fail importVectorKeys step: KMAC256 with customization and 512-bit output with transferred plaintext during call
|
||||
Fail importVectorKeys step: KMAC256 with large data and no customization with transferred plaintext during call
|
||||
Fail importVectorKeys step: KMAC256 with large data and customization with transferred plaintext during call
|
||||
Fail importVectorKeys step: KMAC128 with no customization with transferred plaintext after call
|
||||
Fail importVectorKeys step: KMAC128 with customization with transferred plaintext after call
|
||||
Fail importVectorKeys step: KMAC128 with large data and customization with transferred plaintext after call
|
||||
Fail importVectorKeys step: KMAC256 with customization and 512-bit output with transferred plaintext after call
|
||||
Fail importVectorKeys step: KMAC256 with large data and no customization with transferred plaintext after call
|
||||
Fail importVectorKeys step: KMAC256 with large data and customization with transferred plaintext after call
|
||||
Fail importVectorKeys step: KMAC128 with no customization no verify usage
|
||||
Fail importVectorKeys step: KMAC128 with customization no verify usage
|
||||
Fail importVectorKeys step: KMAC128 with large data and customization no verify usage
|
||||
Fail importVectorKeys step: KMAC256 with customization and 512-bit output no verify usage
|
||||
Fail importVectorKeys step: KMAC256 with large data and no customization no verify usage
|
||||
Fail importVectorKeys step: KMAC256 with large data and customization no verify usage
|
||||
Fail importVectorKeys step: KMAC128 with no customization round trip
|
||||
Fail importVectorKeys step: KMAC128 with customization round trip
|
||||
Fail importVectorKeys step: KMAC128 with large data and customization round trip
|
||||
Fail importVectorKeys step: KMAC256 with customization and 512-bit output round trip
|
||||
Fail importVectorKeys step: KMAC256 with large data and no customization round trip
|
||||
Fail importVectorKeys step: KMAC256 with large data and customization round trip
|
||||
Fail importVectorKeys step: KMAC128 with no customization verification failure due to wrong plaintext
|
||||
Fail importVectorKeys step: KMAC128 with customization verification failure due to wrong plaintext
|
||||
Fail importVectorKeys step: KMAC128 with large data and customization verification failure due to wrong plaintext
|
||||
Fail importVectorKeys step: KMAC256 with customization and 512-bit output verification failure due to wrong plaintext
|
||||
Fail importVectorKeys step: KMAC256 with large data and no customization verification failure due to wrong plaintext
|
||||
Fail importVectorKeys step: KMAC256 with large data and customization verification failure due to wrong plaintext
|
||||
Fail importVectorKeys step: KMAC128 with no customization verification failure due to wrong signature
|
||||
Fail importVectorKeys step: KMAC128 with customization verification failure due to wrong signature
|
||||
Fail importVectorKeys step: KMAC128 with large data and customization verification failure due to wrong signature
|
||||
Fail importVectorKeys step: KMAC256 with customization and 512-bit output verification failure due to wrong signature
|
||||
Fail importVectorKeys step: KMAC256 with large data and no customization verification failure due to wrong signature
|
||||
Fail importVectorKeys step: KMAC256 with large data and customization verification failure due to wrong signature
|
||||
Fail importVectorKeys step: KMAC128 with no customization verification failure due to short signature
|
||||
Fail importVectorKeys step: KMAC128 with customization verification failure due to short signature
|
||||
Fail importVectorKeys step: KMAC128 with large data and customization verification failure due to short signature
|
||||
Fail importVectorKeys step: KMAC256 with customization and 512-bit output verification failure due to short signature
|
||||
Fail importVectorKeys step: KMAC256 with large data and no customization verification failure due to short signature
|
||||
Fail importVectorKeys step: KMAC256 with large data and customization verification failure due to short signature
|
||||
Fail importVectorKeys step: KMAC128 with no customization verification failure due to wrong length parameter
|
||||
Fail importVectorKeys step: KMAC128 with customization verification failure due to wrong length parameter
|
||||
Fail importVectorKeys step: KMAC128 with large data and customization verification failure due to wrong length parameter
|
||||
Fail importVectorKeys step: KMAC256 with customization and 512-bit output verification failure due to wrong length parameter
|
||||
Fail importVectorKeys step: KMAC256 with large data and no customization verification failure due to wrong length parameter
|
||||
Fail importVectorKeys step: KMAC256 with large data and customization verification failure due to wrong length parameter
|
||||
Fail importVectorKeys step: KMAC128 with no customization signing with wrong algorithm name
|
||||
Fail importVectorKeys step: KMAC128 with customization signing with wrong algorithm name
|
||||
Fail importVectorKeys step: KMAC128 with large data and customization signing with wrong algorithm name
|
||||
Fail importVectorKeys step: KMAC256 with customization and 512-bit output signing with wrong algorithm name
|
||||
Fail importVectorKeys step: KMAC256 with large data and no customization signing with wrong algorithm name
|
||||
Fail importVectorKeys step: KMAC256 with large data and customization signing with wrong algorithm name
|
||||
Fail importVectorKeys step: KMAC128 with no customization verifying with wrong algorithm name
|
||||
Fail importVectorKeys step: KMAC128 with customization verifying with wrong algorithm name
|
||||
Fail importVectorKeys step: KMAC128 with large data and customization verifying with wrong algorithm name
|
||||
Fail importVectorKeys step: KMAC256 with customization and 512-bit output verifying with wrong algorithm name
|
||||
Fail importVectorKeys step: KMAC256 with large data and no customization verifying with wrong algorithm name
|
||||
Fail importVectorKeys step: KMAC256 with large data and customization verifying with wrong algorithm name
|
||||
Reference in New Issue
Block a user