getPublicKey.tentative.https.any.js.ini (3133B)
1 [getPublicKey.tentative.https.any.html] 2 [getPublicKey works for ECDH] 3 expected: FAIL 4 5 [getPublicKey works for ECDSA] 6 expected: FAIL 7 8 [getPublicKey works for Ed25519] 9 expected: FAIL 10 11 [getPublicKey works for RSA-OAEP] 12 expected: FAIL 13 14 [getPublicKey works for RSA-PSS] 15 expected: FAIL 16 17 [getPublicKey works for RSASSA-PKCS1-v1_5] 18 expected: FAIL 19 20 [getPublicKey works for X25519] 21 expected: FAIL 22 23 [Derived public key is functionally equivalent to original public key] 24 expected: FAIL 25 26 [getPublicKey works with empty usages for ECDH] 27 expected: FAIL 28 29 [getPublicKey works with empty usages for ECDSA] 30 expected: FAIL 31 32 [getPublicKey works with empty usages for Ed25519] 33 expected: FAIL 34 35 [getPublicKey works with empty usages for RSA-OAEP] 36 expected: FAIL 37 38 [getPublicKey works with empty usages for RSA-PSS] 39 expected: FAIL 40 41 [getPublicKey works with empty usages for RSASSA-PKCS1-v1_5] 42 expected: FAIL 43 44 [getPublicKey works with empty usages for X25519] 45 expected: FAIL 46 47 [getPublicKey rejects with InvalidAccessError when given a public key] 48 expected: FAIL 49 50 [getPublicKey rejects with NotSupportedError for AES-GCM symmetric keys] 51 expected: FAIL 52 53 [getPublicKey rejects with NotSupportedError for HMAC symmetric keys] 54 expected: FAIL 55 56 [getPublicKey rejects with SyntaxError for invalid usages] 57 expected: FAIL 58 59 [getPublicKey rejects with SyntaxError when any usage is invalid for the algorithm] 60 expected: FAIL 61 62 [getPublicKey method is available] 63 expected: FAIL 64 65 66 [getPublicKey.tentative.https.any.worker.html] 67 [getPublicKey works for ECDH] 68 expected: FAIL 69 70 [getPublicKey works for ECDSA] 71 expected: FAIL 72 73 [getPublicKey works for Ed25519] 74 expected: FAIL 75 76 [getPublicKey works for RSA-OAEP] 77 expected: FAIL 78 79 [getPublicKey works for RSA-PSS] 80 expected: FAIL 81 82 [getPublicKey works for RSASSA-PKCS1-v1_5] 83 expected: FAIL 84 85 [getPublicKey works for X25519] 86 expected: FAIL 87 88 [Derived public key is functionally equivalent to original public key] 89 expected: FAIL 90 91 [getPublicKey works with empty usages for ECDH] 92 expected: FAIL 93 94 [getPublicKey works with empty usages for ECDSA] 95 expected: FAIL 96 97 [getPublicKey works with empty usages for Ed25519] 98 expected: FAIL 99 100 [getPublicKey works with empty usages for RSA-OAEP] 101 expected: FAIL 102 103 [getPublicKey works with empty usages for RSA-PSS] 104 expected: FAIL 105 106 [getPublicKey works with empty usages for RSASSA-PKCS1-v1_5] 107 expected: FAIL 108 109 [getPublicKey works with empty usages for X25519] 110 expected: FAIL 111 112 [getPublicKey rejects with InvalidAccessError when given a public key] 113 expected: FAIL 114 115 [getPublicKey rejects with NotSupportedError for AES-GCM symmetric keys] 116 expected: FAIL 117 118 [getPublicKey rejects with NotSupportedError for HMAC symmetric keys] 119 expected: FAIL 120 121 [getPublicKey rejects with SyntaxError for invalid usages] 122 expected: FAIL 123 124 [getPublicKey rejects with SyntaxError when any usage is invalid for the algorithm] 125 expected: FAIL 126 127 [getPublicKey method is available] 128 expected: FAIL