Input buildinfo: https://buildinfos.debian.net/buildinfo-pool/n/node-trust-webcrypto/node-trust-webcrypto_0.9.2-1_all.buildinfo Use metasnap for getting required timestamps New buildinfo file: /tmp/node-trust-webcrypto-0.9.2-11j04xfbu/node-trust-webcrypto_0.9.2-1_all.buildinfo Get source package info: node-trust-webcrypto=0.9.2-1 Source URL: http://snapshot.notset.fr/mr/package/node-trust-webcrypto/0.9.2-1/srcfiles?fileinfo=1 env -i PATH=/usr/sbin:/usr/bin:/sbin:/bin TMPDIR=/tmp mmdebstrap --arch=amd64 --include=autoconf=2.69-11 automake=1:1.16.1-4 autopoint=0.19.8.1-9 autotools-dev=20180224.1 base-files=10.1 base-passwd=3.5.45 bash=5.0-2 binutils=2.31.1-11 binutils-common=2.31.1-11 binutils-x86-64-linux-gnu=2.31.1-11 bsdmainutils=11.1.2+b1 bsdutils=1:2.33.1-0.1 build-essential=12.5 bzip2=1.0.6-9 chai=4.2.0+ds-3 coreutils=8.30-1 cpp=4:8.2.0-2 cpp-8=8.2.0-16 dash=0.5.10.2-5 debconf=1.5.70 debhelper=12 debianutils=4.8.6.1 dh-autoreconf=19 dh-strip-nondeterminism=1.1.0-1 diffutils=1:3.6-1 dpkg=1.19.4 dpkg-dev=1.19.4 dwz=0.12-3 fdisk=2.33.1-0.1 file=1:5.35-2 findutils=4.6.0+git+20190105-2 g++=4:8.2.0-2 g++-8=8.2.0-16 gcc=4:8.2.0-2 gcc-8=8.2.0-16 gcc-8-base=8.2.0-16 gettext=0.19.8.1-9 gettext-base=0.19.8.1-9 grep=3.3-1 groff-base=1.22.4-2 gzip=1.9-3 hicolor-icon-theme=0.17-2 hostname=3.21 init-system-helpers=1.56+nmu1 intltool-debian=0.35.0+20060710.5 libacl1=2.2.52-3+b1 libarchive-zip-perl=1.64-1 libasan5=8.2.0-16 libatomic1=8.2.0-16 libattr1=1:2.4.47-2+b2 libaudit-common=1:2.8.4-2 libaudit1=1:2.8.4-2 libbinutils=2.31.1-11 libblkid1=2.33.1-0.1 libbsd0=0.9.1-1 libbz2-1.0=1.0.6-9 libc-ares2=1.14.0-1 libc-bin=2.28-5 libc-dev-bin=2.28-5 libc6=2.28-5 libc6-dev=2.28-5 libcap-ng0=0.7.9-2 libcc1-0=8.2.0-16 libcroco3=0.6.12-3 libdb5.3=5.3.28+dfsg1-0.3 libdebconfclient0=0.246 libdpkg-perl=1.19.4 libelf1=0.175-2 libfdisk1=2.33.1-0.1 libffi6=3.2.1-9 libfile-stripnondeterminism-perl=1.1.0-1 libgcc-8-dev=8.2.0-16 libgcc1=1:8.2.0-16 libgcrypt20=1.8.4-5 libgdbm-compat4=1.18.1-2 libgdbm6=1.18.1-2 libgdk-pixbuf2.0-0=2.38.0+dfsg-7 libgdk-pixbuf2.0-common=2.38.0+dfsg-7 libglib2.0-0=2.58.2-4 libgmp10=2:6.1.2+dfsg-4 libgomp1=8.2.0-16 libgpg-error0=1.33-3 libicu63=63.1-6 libisl19=0.20-2 libitm1=8.2.0-16 libjbig0=2.1-3.1+b2 libjpeg62-turbo=1:1.5.2-2+b1 libjs-chai=4.2.0+ds-3 libjs-inherits=2.0.3-1 libjs-mocha=4.1.0+ds3-3 libjs-text-encoding=0.7.0-1 libjs-util=0.10.3-2 liblsan0=8.2.0-16 liblua5.1-0=5.1.5-8.1+b2 liblz4-1=1.8.3-1 liblzma5=5.2.4-1 libmagic-mgc=1:5.35-2 libmagic1=1:5.35-2 libmount1=2.33.1-0.1 libmpc3=1.1.0-1 libmpfr6=4.0.2-1 libmpx2=8.2.0-16 libncurses6=6.1+20181013-1 libncursesw6=6.1+20181013-1 libnghttp2-14=1.36.0-2 libnode64=10.15.1~dfsg-2 libnotify-bin=0.7.7-4 libnotify4=0.7.7-4 libpam-modules=1.1.8-4 libpam-modules-bin=1.1.8-4 libpam-runtime=1.1.8-4 libpam0g=1.1.8-4 libpcre3=2:8.39-11 libperl5.28=5.28.1-4 libpipeline1=1.5.1-1 libpng16-16=1.6.36-5 libquadmath0=8.2.0-16 libseccomp2=2.3.3-3 libselinux1=2.8-1+b1 libsigsegv2=2.12-2 libsmartcols1=2.33.1-0.1 libssl1.1=1.1.1a-1 libstdc++-8-dev=8.2.0-16 libstdc++6=8.2.0-16 libsystemd0=240-5 libtiff5=4.0.10-4 libtinfo6=6.1+20181013-1 libtool=2.4.6-9 libtsan0=8.2.0-16 libubsan1=8.2.0-16 libuchardet0=0.0.6-3 libudev1=240-5 libunistring2=0.9.10-1 libuuid1=2.33.1-0.1 libuv1=1.24.1-1 libwebp6=0.6.1-2 libx11-6=2:1.6.7-1 libx11-data=2:1.6.7-1 libxau6=1:1.0.8-1+b2 libxcb1=1.13.1-2 libxdmcp6=1:1.1.2-3 libxml2=2.9.4+dfsg1-7+b3 libyaml-0-2=0.2.1-1 libzstd1=1.3.8+dfsg-3 linux-libc-dev=4.19.16-1 login=1:4.5-1.1 m4=1.4.18-2 make=4.2.1-1.2 man-db=2.8.5-1 mawk=1.3.3-17+b3 mocha=4.1.0+ds3-3 ncurses-base=6.1+20181013-1 ncurses-bin=6.1+20181013-1 node-asn1=0.2.3-1 node-asn1.js=5.0.1-2 node-assert=1.4.1-1 node-assertion-error=1.0.2-1 node-balanced-match=0.4.2-1 node-base64url=3.0.1-2 node-bn.js=4.11.8-2 node-brace-expansion=1.1.8-1 node-brorand=1.1.0-2 node-browser-stdout=1.3.0-1 node-check-error=1.0.2-1 node-commander=2.12.2-1 node-concat-map=0.0.1-1 node-debug=3.1.0-2 node-deep-eql=3.0.1-1 node-diff=1.4.0~dfsg-1 node-elliptic=6.4.1~dfsg-1 node-escape-string-regexp=1.0.5-1 node-fs.realpath=1.0.0-1 node-get-func-name=2.0.0+dfsg-1 node-glob=7.1.3-2 node-growl=1.10.5-2 node-has-flag=2.0.0-1 node-hash.js=1.1.5-1 node-he=1.1.1-1 node-hmac-drbg=1.0.1-2 node-inflight=1.0.6-1 node-inherits=2.0.3-1 node-minimalistic-crypto-utils=1.0.1-2 node-minimatch=3.0.4-3 node-mkdirp=0.5.1-1 node-ms=2.1.1-1 node-node-rsa=1.0.3-1 node-once=1.4.0-3 node-path-is-absolute=1.0.0-1 node-pathval=1.1.0-3 node-supports-color=4.4.0-2 node-text-encoding=0.7.0-1 node-trust-keyto=0.3.4-1 node-type-detect=4.0.0-1 node-util=0.10.3-2 node-wrappy=1.0.2-1 nodejs=10.15.1~dfsg-2 oxygen-icon-theme=5:5.54.0-1 pandoc=2.2.1-3+b2 pandoc-data=2.2.1-3 patch=2.7.6-3 perl=5.28.1-4 perl-base=5.28.1-4 perl-modules-5.28=5.28.1-4 po-debconf=1.0.21 sed=4.7-1 sensible-utils=0.0.12 shared-mime-info=1.10-1 sysvinit-utils=2.93-6 tar=1.30+dfsg-4 util-linux=2.33.1-0.1 xz-utils=5.2.4-1 zlib1g=1:1.2.11.dfsg-1 --variant=apt --aptopt=Acquire::Check-Valid-Until "false" --aptopt=Acquire::http::Dl-Limit "1000"; --aptopt=Acquire::https::Dl-Limit "1000"; --aptopt=Acquire::Retries "5"; --aptopt=APT::Get::allow-downgrades "true"; --keyring=/usr/share/keyrings/ --essential-hook=chroot "$1" sh -c "apt-get --yes install fakeroot util-linux" --essential-hook=copy-in /usr/share/keyrings/debian-archive-bullseye-automatic.gpg /usr/share/keyrings/debian-archive-bullseye-security-automatic.gpg /usr/share/keyrings/debian-archive-bullseye-stable.gpg /usr/share/keyrings/debian-archive-buster-automatic.gpg /usr/share/keyrings/debian-archive-buster-security-automatic.gpg /usr/share/keyrings/debian-archive-buster-stable.gpg /usr/share/keyrings/debian-archive-keyring.gpg /usr/share/keyrings/debian-archive-removed-keys.gpg /usr/share/keyrings/debian-archive-stretch-automatic.gpg /usr/share/keyrings/debian-archive-stretch-security-automatic.gpg /usr/share/keyrings/debian-archive-stretch-stable.gpg /usr/share/keyrings/debian-ports-archive-keyring-removed.gpg /usr/share/keyrings/debian-ports-archive-keyring.gpg /usr/share/keyrings/debian-keyring.gpg /etc/apt/trusted.gpg.d/ --essential-hook=chroot "$1" sh -c "rm /etc/apt/sources.list && echo 'deb http://snapshot.notset.fr/archive/debian/20210814T212851Z/ bookworm main deb-src http://snapshot.notset.fr/archive/debian/20210814T212851Z/ bookworm main deb http://snapshot.notset.fr/archive/debian/20190226T221051Z/ unstable main deb http://snapshot.notset.fr/archive/debian/20190203T213000Z/ unstable main' >> /etc/apt/sources.list && apt-get update" --customize-hook=chroot "$1" useradd --no-create-home -d /nonexistent -p "" builduser -s /bin/bash --customize-hook=chroot "$1" env sh -c "apt-get source --only-source -d node-trust-webcrypto=0.9.2-1 && mkdir -p /build/node-trust-webcrypto-gzQIEU && dpkg-source --no-check -x /*.dsc /build/node-trust-webcrypto-gzQIEU/node-trust-webcrypto-0.9.2 && chown -R builduser:builduser /build/node-trust-webcrypto-gzQIEU" --customize-hook=chroot "$1" env --unset=TMPDIR runuser builduser -c "cd /build/node-trust-webcrypto-gzQIEU/node-trust-webcrypto-0.9.2 && env DEB_BUILD_OPTIONS="parallel=4" LC_ALL="POSIX" SOURCE_DATE_EPOCH="1549464241" dpkg-buildpackage -uc -a amd64 --build=all" --customize-hook=sync-out /build/node-trust-webcrypto-gzQIEU /tmp/node-trust-webcrypto-0.9.2-11j04xfbu buster /dev/null deb http://snapshot.notset.fr/archive/debian/20190203T213000Z unstable main I: automatically chosen mode: root I: chroot architecture amd64 is equal to the host's architecture I: automatically chosen format: tar I: using /tmp/mmdebstrap.Vbz0ifIzoL as tempdir I: running apt-get update... I: downloading packages with apt... I: extracting archives... I: installing essential packages... I: running --essential-hook in shell: sh -c 'chroot "$1" sh -c "apt-get --yes install fakeroot util-linux"' exec /tmp/mmdebstrap.Vbz0ifIzoL Reading package lists... Building dependency tree... util-linux is already the newest version (2.33.1-0.1). The following NEW packages will be installed: fakeroot libfakeroot 0 upgraded, 2 newly installed, 0 to remove and 0 not upgraded. Need to get 132 kB of archives. After this operation, 373 kB of additional disk space will be used. Get:1 http://snapshot.notset.fr/archive/debian/20190203T213000Z unstable/main amd64 libfakeroot amd64 1.23-1 [45.9 kB] Get:2 http://snapshot.notset.fr/archive/debian/20190203T213000Z unstable/main amd64 fakeroot amd64 1.23-1 [85.8 kB] debconf: delaying package configuration, since apt-utils is not installed Fetched 132 kB in 0s (1167 kB/s) Selecting previously unselected package libfakeroot:amd64. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 4351 files and directories currently installed.) Preparing to unpack .../libfakeroot_1.23-1_amd64.deb ... Unpacking libfakeroot:amd64 (1.23-1) ... Selecting previously unselected package fakeroot. Preparing to unpack .../fakeroot_1.23-1_amd64.deb ... Unpacking fakeroot (1.23-1) ... Setting up libfakeroot:amd64 (1.23-1) ... Setting up fakeroot (1.23-1) ... update-alternatives: using /usr/bin/fakeroot-sysv to provide /usr/bin/fakeroot (fakeroot) in auto mode Processing triggers for libc-bin (2.28-5) ... I: running special hook: copy-in /usr/share/keyrings/debian-archive-bullseye-automatic.gpg /usr/share/keyrings/debian-archive-bullseye-security-automatic.gpg /usr/share/keyrings/debian-archive-bullseye-stable.gpg /usr/share/keyrings/debian-archive-buster-automatic.gpg /usr/share/keyrings/debian-archive-buster-security-automatic.gpg /usr/share/keyrings/debian-archive-buster-stable.gpg /usr/share/keyrings/debian-archive-keyring.gpg /usr/share/keyrings/debian-archive-removed-keys.gpg /usr/share/keyrings/debian-archive-stretch-automatic.gpg /usr/share/keyrings/debian-archive-stretch-security-automatic.gpg /usr/share/keyrings/debian-archive-stretch-stable.gpg /usr/share/keyrings/debian-ports-archive-keyring-removed.gpg /usr/share/keyrings/debian-ports-archive-keyring.gpg /usr/share/keyrings/debian-keyring.gpg /etc/apt/trusted.gpg.d/ I: running --essential-hook in shell: sh -c 'chroot "$1" sh -c "rm /etc/apt/sources.list && echo 'deb http://snapshot.notset.fr/archive/debian/20210814T212851Z/ bookworm main deb-src http://snapshot.notset.fr/archive/debian/20210814T212851Z/ bookworm main deb http://snapshot.notset.fr/archive/debian/20190226T221051Z/ unstable main deb http://snapshot.notset.fr/archive/debian/20190203T213000Z/ unstable main' >> /etc/apt/sources.list && apt-get update"' exec /tmp/mmdebstrap.Vbz0ifIzoL Get:1 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm InRelease [81.6 kB] Get:2 http://snapshot.notset.fr/archive/debian/20190226T221051Z unstable InRelease [242 kB] Hit:3 http://snapshot.notset.fr/archive/debian/20190203T213000Z unstable InRelease Ign:4 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main Sources Ign:5 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main amd64 Packages Ign:4 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main Sources Ign:5 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main amd64 Packages Ign:4 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main Sources Ign:5 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main amd64 Packages Get:4 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main Sources [11.4 MB] Get:5 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main amd64 Packages [11.1 MB] Ign:6 http://snapshot.notset.fr/archive/debian/20190226T221051Z unstable/main amd64 Packages Ign:6 http://snapshot.notset.fr/archive/debian/20190226T221051Z unstable/main amd64 Packages Ign:6 http://snapshot.notset.fr/archive/debian/20190226T221051Z unstable/main amd64 Packages Get:6 http://snapshot.notset.fr/archive/debian/20190226T221051Z unstable/main amd64 Packages [11.2 MB] Fetched 34.0 MB in 29s (1183 kB/s) Reading package lists... I: installing remaining packages inside the chroot... I: running --customize-hook in shell: sh -c 'chroot "$1" useradd --no-create-home -d /nonexistent -p "" builduser -s /bin/bash' exec /tmp/mmdebstrap.Vbz0ifIzoL I: running --customize-hook in shell: sh -c 'chroot "$1" env sh -c "apt-get source --only-source -d node-trust-webcrypto=0.9.2-1 && mkdir -p /build/node-trust-webcrypto-gzQIEU && dpkg-source --no-check -x /*.dsc /build/node-trust-webcrypto-gzQIEU/node-trust-webcrypto-0.9.2 && chown -R builduser:builduser /build/node-trust-webcrypto-gzQIEU"' exec /tmp/mmdebstrap.Vbz0ifIzoL Reading package lists... NOTICE: 'node-trust-webcrypto' packaging is maintained in the 'Git' version control system at: https://salsa.debian.org/js-team/node-trust-webcrypto.git Please use: git clone https://salsa.debian.org/js-team/node-trust-webcrypto.git to retrieve the latest (possibly unreleased) updates to the package. Need to get 96.4 kB of source archives. Get:1 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main node-trust-webcrypto 0.9.2-1 (dsc) [2275 B] Get:2 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main node-trust-webcrypto 0.9.2-1 (tar) [88.9 kB] Get:3 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main node-trust-webcrypto 0.9.2-1 (diff) [5248 B] Fetched 96.4 kB in 0s (1203 kB/s) Download complete and in download only mode W: Download is performed unsandboxed as root as file 'node-trust-webcrypto_0.9.2-1.dsc' couldn't be accessed by user '_apt'. - pkgAcquire::Run (13: Permission denied) dpkg-source: info: extracting node-trust-webcrypto in /build/node-trust-webcrypto-gzQIEU/node-trust-webcrypto-0.9.2 dpkg-source: info: unpacking node-trust-webcrypto_0.9.2.orig.tar.gz dpkg-source: info: unpacking node-trust-webcrypto_0.9.2-1.debian.tar.xz dpkg-source: info: using patch list from debian/patches/series dpkg-source: info: applying 2001_privacy.patch dpkg-source: info: applying 2002_mocha.patch I: running --customize-hook in shell: sh -c 'chroot "$1" env --unset=TMPDIR runuser builduser -c "cd /build/node-trust-webcrypto-gzQIEU/node-trust-webcrypto-0.9.2 && env DEB_BUILD_OPTIONS="parallel=4" LC_ALL="POSIX" SOURCE_DATE_EPOCH="1549464241" dpkg-buildpackage -uc -a amd64 --build=all"' exec /tmp/mmdebstrap.Vbz0ifIzoL dpkg-buildpackage: info: source package node-trust-webcrypto dpkg-buildpackage: info: source version 0.9.2-1 dpkg-buildpackage: info: source distribution unstable dpkg-buildpackage: info: source changed by Jonas Smedegaard dpkg-source --before-build . debian/rules clean dh clean dh_clean debian/rules binary-indep dh binary-indep dh_update_autotools_config -i debian/rules override_dh_auto_build make[1]: Entering directory '/build/node-trust-webcrypto-gzQIEU/node-trust-webcrypto-0.9.2' pandoc --from gfm-raw_html --to html --standalone --output README.html README.md [WARNING] This document format requires a nonempty element. Please specify either 'title' or 'pagetitle' in the metadata. Falling back to 'README' pandoc --from gfm-raw_html --to plain --output README.txt README.md dh override_dh_auto_build make[1]: Leaving directory '/build/node-trust-webcrypto-gzQIEU/node-trust-webcrypto-0.9.2' debian/rules override_dh_auto_test make[1]: Entering directory '/build/node-trust-webcrypto-gzQIEU/node-trust-webcrypto-0.9.2' NODE_ENV=test prove --verbose \ --exec "mocha --reporter=tap" \ test/*.js test/*/*.js test/CryptoSpec.js .............................. 1..3 ok 1 Crypto getRandomValues should return the typed array argument ok 2 Crypto getRandomValues should write random values to the typed array ok 3 Crypto subtle should return a SubtleCrypto instance # tests 3 # pass 3 # fail 0 ok test/EcdsaKeyPairsForTesting.js ................. skipped: (no reason given) test/RsaKeyPairForPSSTesting.js ................. skipped: (no reason given) test/RsaKeyPairForTesting.js .................... skipped: (no reason given) test/SubtleCryptoSpec.js ........................ 1..84 ok 1 SubtleCrypto encrypt with invalid algorithm should return a promise ok 2 SubtleCrypto encrypt with invalid algorithm should reject the promise ok 3 SubtleCrypto encrypt with mismatched algorithm name should return a promise ok 4 SubtleCrypto encrypt with mismatched algorithm name should reject the promise ok 5 SubtleCrypto encrypt with invalid usages should return a promise ok 6 SubtleCrypto encrypt with invalid usages should reject the promise ok 7 SubtleCrypto encrypt with valid arguments should return a promise ok 8 SubtleCrypto encrypt with valid arguments should resolve an ArrayBuffer ok 9 SubtleCrypto encrypt with valid arguments should resolve a correct encryption for the data and key ok 10 SubtleCrypto encrypt with valid arguments should not reject the promise ok 11 SubtleCrypto decrypt with invalid algorithm should return a promise ok 12 SubtleCrypto decrypt with invalid algorithm should reject the promise ok 13 SubtleCrypto decrypt with mismatched algorithm name should return a promise ok 14 SubtleCrypto decrypt with mismatched algorithm name should reject the promise ok 15 SubtleCrypto decrypt with invalid usages should return a promise ok 16 SubtleCrypto decrypt with invalid usages should reject the promise ok 17 SubtleCrypto decrypt with valid arguments should return a promise ok 18 SubtleCrypto decrypt with valid arguments should resolve a correct decryption for the data and key ok 19 SubtleCrypto decrypt with valid arguments should not reject the promise ok 20 SubtleCrypto sign with invalid algorithm should return a promise ok 21 SubtleCrypto sign with invalid algorithm should reject the promise ok 22 SubtleCrypto sign with mismatched algorithm name should return a promise ok 23 SubtleCrypto sign with mismatched algorithm name should reject the promise ok 24 SubtleCrypto sign with invalid usages should return a promise ok 25 SubtleCrypto sign with invalid usages should reject the promise ok 26 SubtleCrypto sign with valid arguments should return a promise ok 27 SubtleCrypto sign with valid arguments should resolve an ArrayBuffer ok 28 SubtleCrypto sign with valid arguments should resolve a correct signature for the data and key ok 29 SubtleCrypto sign with valid arguments should not reject the promise ok 30 SubtleCrypto verify with invalid algorithm should return a promise ok 31 SubtleCrypto verify with invalid algorithm should reject the promise ok 32 SubtleCrypto verify with mismatched algorithm name should return a promise ok 33 SubtleCrypto verify with mismatched algorithm name should reject the promise ok 34 SubtleCrypto verify with invalid usages should return a promise ok 35 SubtleCrypto verify with invalid usages should reject the promise ok 36 SubtleCrypto verify with valid arguments should return a promise ok 37 SubtleCrypto verify with valid arguments should resolve the promise ok 38 SubtleCrypto verify with valid arguments should not reject the promise ok 39 SubtleCrypto digest with invalid algorithm should return a promise ok 40 SubtleCrypto digest with invalid algorithm should reject the promise ok 41 SubtleCrypto digest with valid arguments should return a promise ok 42 SubtleCrypto digest with valid arguments should resolve an ArrayBuffer ok 43 SubtleCrypto digest with valid arguments should not reject the promise ok 44 SubtleCrypto generateKey with invalid algorithm should return a promise ok 45 SubtleCrypto generateKey with invalid algorithm should reject the promise ok 46 SubtleCrypto generateKey with invalid CryptoKey usages should return a promise # SKIP - ok 47 SubtleCrypto generateKey with invalid CryptoKey usages should reject the promise # SKIP - ok 48 SubtleCrypto generateKey with invalid CryptoKeyPair usages should return a promise # SKIP - ok 49 SubtleCrypto generateKey with invalid CryptoKeyPair usages should reject the promise # SKIP - ok 50 SubtleCrypto generateKey with valid arguments should return a promise ok 51 SubtleCrypto generateKey with valid arguments should resolve the promise # SKIP - ok 52 SubtleCrypto generateKey with valid arguments should not reject the promise # SKIP - ok 53 SubtleCrypto deriveKey should return a Promise # SKIP - ok 54 SubtleCrypto deriveBits should return a Promise # SKIP - ok 55 SubtleCrypto importKey with invalid algorithm should return a promise ok 56 SubtleCrypto importKey with invalid algorithm should reject the promise ok 57 SubtleCrypto importKey with valid arguments should return a promise ok 58 SubtleCrypto importKey with valid arguments should resolve the promise ok 59 SubtleCrypto importKey with valid arguments should set extractable ok 60 SubtleCrypto importKey with valid arguments should normalize key usages ok 61 SubtleCrypto importKey with valid arguments should not reject the promise ok 62 SubtleCrypto exportKey with invalid algorithm should return a promise ok 63 SubtleCrypto exportKey with invalid algorithm should reject the promise ok 64 SubtleCrypto exportKey with unextractable key should return a promise ok 65 SubtleCrypto exportKey with unextractable key should reject the promise ok 66 SubtleCrypto exportKey with valid arguments should return a promise ok 67 SubtleCrypto exportKey with valid arguments should resolve the promise ok 68 SubtleCrypto exportKey with valid arguments should not reject the promise ok 69 SubtleCrypto wrapKey with invalid algorithm should return a promise ok 70 SubtleCrypto wrapKey with invalid algorithm should reject the promise ok 71 SubtleCrypto wrapKey with invalid name property should reject the promise # SKIP - ok 72 SubtleCrypto wrapKey with invalid key ops should reject the promise # SKIP - ok 73 SubtleCrypto wrapKey with invalid extractable property should reject the promise # SKIP - ok 74 SubtleCrypto wrapKey with valid arguments should return a promise ok 75 SubtleCrypto wrapKey with valid arguments should resolve the promise ok 76 SubtleCrypto wrapKey with valid arguments should not reject the promise ok 77 SubtleCrypto unwrapKey with invalid algorithm should return a promise ok 78 SubtleCrypto unwrapKey with invalid algorithm should reject the promise ok 79 SubtleCrypto unwrapKey with invalid name property should reject the promise # SKIP - ok 80 SubtleCrypto unwrapKey with invalid key ops should reject the promise # SKIP - ok 81 SubtleCrypto unwrapKey with different key arguments should resolve the promise # SKIP - ok 82 SubtleCrypto unwrapKey with valid arguments should return a promise ok 83 SubtleCrypto unwrapKey with valid arguments should resolve the promise ok 84 SubtleCrypto unwrapKey with valid arguments should not reject the promise # tests 70 # pass 70 # fail 0 ok test/algorithms/AES-CBCSpec.js .................. 1..50 ok 1 AES_CBC dictionaries getter should return an array # SKIP - ok 2 AES_CBC members getter should return an object # SKIP - ok 3 AES_CBC encrypt should throw with invalid iv length ok 4 AES_CBC encrypt should return an ArrayBuffer ok 5 AES_CBC encrypt should return a valid encryption ok 6 AES_CBC decrypt should throw with invalid iv length ok 7 AES_CBC decrypt should return an ArrayBuffer ok 8 AES_CBC decrypt should return a valid encryption ok 9 AES_CBC generateKey should throw with invalid usages ok 10 AES_CBC generateKey should throw with invalid paramater length ok 11 AES_CBC generateKey should return CryptoKey ok 12 AES_CBC generateKey should be a secret key type ok 13 AES_CBC generateKey should have AES_CBC type for algorithm ok 14 AES_CBC generateKey should set algorithm name ok 15 AES_CBC generateKey should set key as extractable ok 16 AES_CBC generateKey should set key usages ok 17 AES_CBC generateKey should have correct length key handle ok 18 AES_CBC generateKey should generate a random handle each time ok 19 AES_CBC importKey should expect only "raw" or "jwk" formats ok 20 AES_CBC importKey with "raw" format should expect a suitable raw length ok 21 AES_CBC importKey with "raw" format should be a secret key type ok 22 AES_CBC importKey with "raw" format should have AES_CBC type for algorithm ok 23 AES_CBC importKey with "raw" format should set algorithm name ok 24 AES_CBC importKey with "raw" format should set key as extractable ok 25 AES_CBC importKey with "raw" format should set key usages ok 26 AES_CBC importKey with "raw" format should have correct length key handle ok 27 AES_CBC importKey with "jwk" format should expect a suitable jwk format ok 28 AES_CBC importKey with "jwk" format should expect correct kty format ok 29 AES_CBC importKey with "jwk" format should expect data in k property ok 30 AES_CBC importKey with "jwk" format should expect A128CBC when data length is 16 ok 31 AES_CBC importKey with "jwk" format should expect A192CBC when data length is 24 ok 32 AES_CBC importKey with "jwk" format should expect A256CBC when data length is 32 ok 33 AES_CBC importKey with "jwk" format should expect mismatched length when k is not appropriate base64url ok 34 AES_CBC importKey with "jwk" format should expect correct value when "use" field is used ok 35 AES_CBC importKey with "jwk" format should expect valid key operations ok 36 AES_CBC importKey with "jwk" format should expect non extractable to not be extractable ok 37 AES_CBC importKey with "jwk" format should be a secret key type ok 38 AES_CBC importKey with "jwk" format should have AES_CBC type for algorithm ok 39 AES_CBC importKey with "jwk" format should set algorithm name ok 40 AES_CBC importKey with "jwk" format should set key as extractable ok 41 AES_CBC importKey with "jwk" format should set key usages ok 42 AES_CBC importKey with "jwk" format should have correct length key handle ok 43 AES_CBC exportKey should have a valid handle in the key ok 44 AES_CBC exportKey should expect only "raw" or "jwk" formats ok 45 AES_CBC exportKey with "raw" format should return a valid object ok 46 AES_CBC exportKey with "jwk" format should return a valid object ok 47 AES_CBC exportKey with "jwk" format should expect correct kty field ok 48 AES_CBC exportKey with "jwk" format should expect A128CBC when data length is 16 ok 49 AES_CBC exportKey with "jwk" format should expect A192CBC when data length is 24 ok 50 AES_CBC exportKey with "jwk" format should expect A256CBC when data length is 32 # tests 48 # pass 48 # fail 0 ok test/algorithms/AES-CTRSpec.js .................. 1..56 ok 1 AES_CTR dictionaries getter should return an array # SKIP - ok 2 AES_CTR members getter should return an object # SKIP - ok 3 AES_CTR encrypt should throw with empty counter ok 4 AES_CTR encrypt should throw with invalid counter ok 5 AES_CTR encrypt should throw with length value ok 6 AES_CTR encrypt should return an ArrayBuffer ok 7 AES_CTR encrypt should return a valid encryption ok 8 AES_CTR decrypt should throw with empty counter ok 9 AES_CTR decrypt should throw with invalid counter ok 10 AES_CTR decrypt should throw with invalid length value ok 11 AES_CTR decrypt should return an ArrayBuffer ok 12 AES_CTR decrypt should return a valid decryption ok 13 AES_CTR generateKey should throw with invalid usages ok 14 AES_CTR generateKey should throw with invalid parameter length ok 15 AES_CTR generateKey should return CryptoKey ok 16 AES_CTR generateKey should be a secret key type ok 17 AES_CTR generateKey should have AES_CTR type for algorithm ok 18 AES_CTR generateKey should set algorithm name ok 19 AES_CTR generateKey should set key as extractable ok 20 AES_CTR generateKey should set key usages ok 21 AES_CTR generateKey should have correct length key handle ok 22 AES_CTR generateKey should generate a random handle each time ok 23 AES_CTR importKey should throw with invalid usages ok 24 AES_CTR importKey should expect only "raw" or "jwk" formats ok 25 AES_CTR importKey with "raw" format should expect a suitable raw length ok 26 AES_CTR importKey with "raw" format should be a secret key type ok 27 AES_CTR importKey with "raw" format should have AES_CTR type for algorithm ok 28 AES_CTR importKey with "raw" format should set algorithm name ok 29 AES_CTR importKey with "raw" format should set key as extractable ok 30 AES_CTR importKey with "raw" format should set key usages ok 31 AES_CTR importKey with "raw" format should have correct length key handle ok 32 AES_CTR importKey with "jwk" format should expect a suitable jwk format ok 33 AES_CTR importKey with "jwk" format should expect correct kty format ok 34 AES_CTR importKey with "jwk" format should expect data in k property ok 35 AES_CTR importKey with "jwk" format should expect A128CTR when data length is 16 ok 36 AES_CTR importKey with "jwk" format should expect A192CTR when data length is 24 ok 37 AES_CTR importKey with "jwk" format should expect A256CTR when data length is 32 ok 38 AES_CTR importKey with "jwk" format should expect mismatched length when k is not appropriate base64url ok 39 AES_CTR importKey with "jwk" format should expect correct value when "use" field is used ok 40 AES_CTR importKey with "jwk" format should expect valid key operations ok 41 AES_CTR importKey with "jwk" format should expect non extractable to not be extractable ok 42 AES_CTR importKey with "jwk" format should be a secret key type ok 43 AES_CTR importKey with "jwk" format should have AES_CTR type for algorithm ok 44 AES_CTR importKey with "jwk" format should set algorithm name ok 45 AES_CTR importKey with "jwk" format should set key as extractable ok 46 AES_CTR importKey with "jwk" format should set key usages ok 47 AES_CTR importKey with "jwk" format should have correct length key handle ok 48 AES_CTR exportKey should have a valid handle in the key ok 49 AES_CTR exportKey should expect only "raw" or "jwk" formats ok 50 AES_CTR exportKey with "raw" format should return a valid object ok 51 AES_CTR exportKey with "raw" format should be the same as the Chrome exported key ok 52 AES_CTR exportKey with "jwk" format should return a valid object ok 53 AES_CTR exportKey with "jwk" format should expect correct kty field ok 54 AES_CTR exportKey with "jwk" format should expect A128CTR when data length is 16 ok 55 AES_CTR exportKey with "jwk" format should expect A192CTR when data length is 24 ok 56 AES_CTR exportKey with "jwk" format should expect A256CTR when data length is 32 # tests 54 # pass 54 # fail 0 ok test/algorithms/AES-GCMSpec.js .................. 1..59 ok 1 AES_GCM dictionaries getter should return an array # SKIP - ok 2 AES_GCM members getter should return an object # SKIP - ok 3 AES_GCM encrypt should throw invalid data length ok 4 AES_GCM encrypt should throw with invalid iv length ok 5 AES_GCM encrypt should throw with invalid additionalData ok 6 AES_GCM encrypt should accept an ArrayBuffer ok 7 AES_GCM encrypt should return an ArrayBuffer ok 8 AES_GCM encrypt should return a valid encryption ok 9 AES_GCM decrypt should throw with invalid tagLength ok 10 AES_GCM decrypt should throw with unsupported tagLength ok 11 AES_GCM decrypt should throw with invalid data length ok 12 AES_GCM decrypt should throw with invalid data length ok 13 AES_GCM decrypt should throw with invalid iv length ok 14 AES_GCM decrypt should throw with invalid additionalData ok 15 AES_GCM decrypt should return an ArrayBuffer ok 16 AES_GCM decrypt should return a valid decryption ok 17 AES_GCM generateKey should throw with invalid usages ok 18 AES_GCM generateKey should throw with invalid parameter length ok 19 AES_GCM generateKey should return CryptoKey ok 20 AES_GCM generateKey should be a secret key type ok 21 AES_GCM generateKey should have AES_GCM type for algorithm ok 22 AES_GCM generateKey should set algorithm name ok 23 AES_GCM generateKey should set key as extractable ok 24 AES_GCM generateKey should set key usages ok 25 AES_GCM generateKey should have correct length key handle ok 26 AES_GCM generateKey should generate a random handle each time ok 27 AES_GCM importKey should throw with invalid usages ok 28 AES_GCM importKey should expect only "raw" or "jwk" formats ok 29 AES_GCM importKey with "raw" format should expect a suitable raw length ok 30 AES_GCM importKey with "raw" format should be a secret key type ok 31 AES_GCM importKey with "raw" format should have AES_GCM type for algorithm ok 32 AES_GCM importKey with "raw" format should set algorithm name ok 33 AES_GCM importKey with "raw" format should set key as extractable ok 34 AES_GCM importKey with "raw" format should set key usages ok 35 AES_GCM importKey with "raw" format should have correct length key handle ok 36 AES_GCM importKey with "jwk" format should expect a suitable jwk format ok 37 AES_GCM importKey with "jwk" format should expect correct kty format ok 38 AES_GCM importKey with "jwk" format should expect data in k property ok 39 AES_GCM importKey with "jwk" format should expect A128GCM when data length is 16 ok 40 AES_GCM importKey with "jwk" format should expect A192GCM when data length is 24 ok 41 AES_GCM importKey with "jwk" format should expect A256GCM when data length is 32 ok 42 AES_GCM importKey with "jwk" format should expect mismatched length when k is not appropriate base64url ok 43 AES_GCM importKey with "jwk" format should expect correct value when "use" field is used ok 44 AES_GCM importKey with "jwk" format should expect valid key operations ok 45 AES_GCM importKey with "jwk" format should expect non extractable to not be extractable ok 46 AES_GCM importKey with "jwk" format should be a secret key type ok 47 AES_GCM importKey with "jwk" format should have AES_GCM type for algorithm ok 48 AES_GCM importKey with "jwk" format should set algorithm name ok 49 AES_GCM importKey with "jwk" format should set key as extractable ok 50 AES_GCM importKey with "jwk" format should set key usages ok 51 AES_GCM importKey with "jwk" format should have correct length key handle ok 52 AES_GCM exportKey should have a valid handle in the key ok 53 AES_GCM exportKey should expect only "raw" or "jwk" formats ok 54 AES_GCM exportKey with "raw" format should return a valid object ok 55 AES_GCM exportKey with "jwk" format should return a valid object ok 56 AES_GCM exportKey with "jwk" format should expect correct kty field ok 57 AES_GCM exportKey with "jwk" format should expect A128GCM when data length is 16 ok 58 AES_GCM exportKey with "jwk" format should expect A192GCM when data length is 24 ok 59 AES_GCM exportKey with "jwk" format should expect A256GCM when data length is 32 # tests 57 # pass 57 # fail 0 ok test/algorithms/AES-KWSpec.js ................... 1..49 ok 1 AES_KW dictionaries getter should return an array # SKIP - ok 2 AES_KW members getter should return an object # SKIP - ok 3 AES_KW wrapKey should return an ArrayBuffer ok 4 AES_KW wrapKey should return a valid wrapped key object ok 5 AES_KW wrapKey should fail with invalid key length ok 6 AES_KW unwrapKey should return an Array ok 7 AES_KW generateKey should throw with invalid usages ok 8 AES_KW generateKey should throw with invalid parameter length ok 9 AES_KW generateKey should return CryptoKey ok 10 AES_KW generateKey should be a secret key type ok 11 AES_KW generateKey should have AES_KW type for algorithm ok 12 AES_KW generateKey should set algorithm name ok 13 AES_KW generateKey should set key as extractable ok 14 AES_KW generateKey should set key usages ok 15 AES_KW generateKey should have correct length key handle ok 16 AES_KW generateKey should generate a random handle each time ok 17 AES_KW importKey should throw with invalid usages ok 18 AES_KW importKey should expect only "raw" or "jwk" formats ok 19 AES_KW importKey with "raw" format should expect a suitable raw length ok 20 AES_KW importKey with "raw" format should be a secret key type ok 21 AES_KW importKey with "raw" format should have AES_KW type for algorithm ok 22 AES_KW importKey with "raw" format should set algorithm name ok 23 AES_KW importKey with "raw" format should set key as extractable ok 24 AES_KW importKey with "raw" format should set key usages ok 25 AES_KW importKey with "raw" format should have correct length key handle ok 26 AES_KW importKey with "jwk" format should expect a suitable jwk format ok 27 AES_KW importKey with "jwk" format should expect correct kty format ok 28 AES_KW importKey with "jwk" format should expect data in k property ok 29 AES_KW importKey with "jwk" format should expect A128KW when data length is 16 ok 30 AES_KW importKey with "jwk" format should expect A192KW when data length is 24 ok 31 AES_KW importKey with "jwk" format should expect A256KW when data length is 32 ok 32 AES_KW importKey with "jwk" format should expect mismatched length when k is not appropriate base64url ok 33 AES_KW importKey with "jwk" format should expect correct value when "use" field is used ok 34 AES_KW importKey with "jwk" format should expect valid key operations ok 35 AES_KW importKey with "jwk" format should expect non extractable to not be extractable ok 36 AES_KW importKey with "jwk" format should be a secret key type ok 37 AES_KW importKey with "jwk" format should have AES_KW type for algorithm ok 38 AES_KW importKey with "jwk" format should set algorithm name ok 39 AES_KW importKey with "jwk" format should set key as extractable ok 40 AES_KW importKey with "jwk" format should set key usages ok 41 AES_KW importKey with "jwk" format should have correct length key handle ok 42 AES_KW exportKey should have a valid handle in the key ok 43 AES_KW exportKey should expect only "raw" or "jwk" formats ok 44 AES_KW exportKey with "raw" format should return a valid object ok 45 AES_KW exportKey with "jwk" format should return a valid object ok 46 AES_KW exportKey with "jwk" format should expect correct kty field ok 47 AES_KW exportKey with "jwk" format should expect A128KW when data length is 16 ok 48 AES_KW exportKey with "jwk" format should expect A192KW when data length is 24 ok 49 AES_KW exportKey with "jwk" format should expect A256KW when data length is 32 # tests 47 # pass 47 # fail 0 ok test/algorithms/ECDSASpec.js .................... 1..172 ok 1 ECDSA K-256 dictionaries getter should return an array # SKIP - ok 2 ECDSA K-256 members getter should return an object # SKIP - ok 3 ECDSA K-256 sign should throw with non-private key ok 4 ECDSA K-256 sign should return an ArrayBuffer ok 5 ECDSA K-256 sign should return a ECDSA signature # SKIP - ok 6 ECDSA K-256 verify should throw with non-private key ok 7 ECDSA K-256 verify should return true with valid signature # SKIP - ok 8 ECDSA K-256 verify should return false with invalid signature ok 9 ECDSA K-256 generateKey should throw with invalid usages # SKIP - ok 10 ECDSA K-256 generateKey should return CryptoKey # SKIP - ok 11 ECDSA K-256 generateKey should set public key type # SKIP - ok 12 ECDSA K-256 generateKey should set private key type # SKIP - ok 13 ECDSA K-256 generateKey should set public key algorithm # SKIP - ok 14 ECDSA K-256 generateKey should set private key algorithm # SKIP - ok 15 ECDSA K-256 generateKey should set public key algorithm name # SKIP - ok 16 ECDSA K-256 generateKey should set private key algorithm name # SKIP - ok 17 ECDSA K-256 generateKey should set public key algorithm hash name # SKIP - ok 18 ECDSA K-256 generateKey should set private key algorithm hash name # SKIP - ok 19 ECDSA K-256 generateKey should set public key extractable # SKIP - ok 20 ECDSA K-256 generateKey should set private key extractable # SKIP - ok 21 ECDSA K-256 generateKey should set public key usages # SKIP - ok 22 ECDSA K-256 generateKey should set private key usages # SKIP - ok 23 ECDSA K-256 generateKey should set public key handle # SKIP - ok 24 ECDSA K-256 generateKey should set private key handle # SKIP - ok 25 ECDSA K-256 importKey with "jwk" format private key and invalid usages should throw SyntaxError ok 26 ECDSA K-256 importKey with "jwk" format non-private key and invalid usages should throw SyntaxError ok 27 ECDSA K-256 importKey with "jwk" format invalid key type should throw DataError ok 28 ECDSA K-256 importKey with "jwk" format invalid key use should throw DataError ok 29 ECDSA K-256 importKey with "jwk" format private K-256 key should define type ok 30 ECDSA K-256 importKey with "jwk" format private K-256 key should define algorithm ok 31 ECDSA K-256 importKey with "jwk" format private K-256 key should define extractable ok 32 ECDSA K-256 importKey with "jwk" format private K-256 key should define usages ok 33 ECDSA K-256 importKey with "jwk" format private K-256 key should define handle ok 34 ECDSA K-256 importKey with "jwk" format public K-256 key should define type ok 35 ECDSA K-256 importKey with "jwk" format public K-256 key should define algorithm ok 36 ECDSA K-256 importKey with "jwk" format public K-256 key should define extractable ok 37 ECDSA K-256 importKey with "jwk" format public K-256 key should define usages ok 38 ECDSA K-256 importKey with "jwk" format public K-256 key should define handle ok 39 ECDSA K-256 importKey with other format should throw NotSupportedError ok 40 ECDSA K-256 exportKey with missing key material should throw OperationError ok 41 ECDSA K-256 exportKey with "jwk" format K-256 curve should set "crv" to "K-256" ok 42 ECDSA K-256 exportKey with "raw" format K-256 curve return the handle of CryptoKey ok 43 ECDSA K-256 exportKey with other format should throw NotSupportedError ok 44 ECDSA P-256 dictionaries getter should return an array # SKIP - ok 45 ECDSA P-256 members getter should return an object # SKIP - ok 46 ECDSA P-256 sign should throw with non-private key ok 47 ECDSA P-256 sign should return an ArrayBuffer ok 48 ECDSA P-256 sign should return a ECDSA signature # SKIP - ok 49 ECDSA P-256 verify should throw with non-private key ok 50 ECDSA P-256 verify should return true with valid signature # SKIP - ok 51 ECDSA P-256 verify should return false with invalid signature ok 52 ECDSA P-256 generateKey should throw with invalid usages # SKIP - ok 53 ECDSA P-256 generateKey should return CryptoKey # SKIP - ok 54 ECDSA P-256 generateKey should set public key type # SKIP - ok 55 ECDSA P-256 generateKey should set private key type # SKIP - ok 56 ECDSA P-256 generateKey should set public key algorithm # SKIP - ok 57 ECDSA P-256 generateKey should set private key algorithm # SKIP - ok 58 ECDSA P-256 generateKey should set public key algorithm name # SKIP - ok 59 ECDSA P-256 generateKey should set private key algorithm name # SKIP - ok 60 ECDSA P-256 generateKey should set public key algorithm hash name # SKIP - ok 61 ECDSA P-256 generateKey should set private key algorithm hash name # SKIP - ok 62 ECDSA P-256 generateKey should set public key extractable # SKIP - ok 63 ECDSA P-256 generateKey should set private key extractable # SKIP - ok 64 ECDSA P-256 generateKey should set public key usages # SKIP - ok 65 ECDSA P-256 generateKey should set private key usages # SKIP - ok 66 ECDSA P-256 generateKey should set public key handle # SKIP - ok 67 ECDSA P-256 generateKey should set private key handle # SKIP - ok 68 ECDSA P-256 importKey with "jwk" format private key and invalid usages should throw SyntaxError ok 69 ECDSA P-256 importKey with "jwk" format non-private key and invalid usages should throw SyntaxError ok 70 ECDSA P-256 importKey with "jwk" format invalid key type should throw DataError ok 71 ECDSA P-256 importKey with "jwk" format invalid key use should throw DataError ok 72 ECDSA P-256 importKey with "jwk" format private P-256 key should define type ok 73 ECDSA P-256 importKey with "jwk" format private P-256 key should define algorithm ok 74 ECDSA P-256 importKey with "jwk" format private P-256 key should define extractable ok 75 ECDSA P-256 importKey with "jwk" format private P-256 key should define usages ok 76 ECDSA P-256 importKey with "jwk" format private P-256 key should define handle ok 77 ECDSA P-256 importKey with "jwk" format public P-256 key should define type ok 78 ECDSA P-256 importKey with "jwk" format public P-256 key should define algorithm ok 79 ECDSA P-256 importKey with "jwk" format public P-256 key should define extractable ok 80 ECDSA P-256 importKey with "jwk" format public P-256 key should define usages ok 81 ECDSA P-256 importKey with "jwk" format public P-256 key should define handle ok 82 ECDSA P-256 importKey with other format should throw NotSupportedError ok 83 ECDSA P-256 exportKey with missing key material should throw OperationError ok 84 ECDSA P-256 exportKey with "jwk" format P-256 curve should set "crv" to "P-256" ok 85 ECDSA P-256 exportKey with "raw" format P-256 curve return the handle of CryptoKey ok 86 ECDSA P-256 exportKey with other format should throw NotSupportedError ok 87 ECDSA P-384 dictionaries getter should return an array # SKIP - ok 88 ECDSA P-384 members getter should return an object # SKIP - ok 89 ECDSA P-384 sign should throw with non-private key ok 90 ECDSA P-384 sign should return an ArrayBuffer ok 91 ECDSA P-384 sign should return a ECDSA signature # SKIP - ok 92 ECDSA P-384 verify should throw with non-private key ok 93 ECDSA P-384 verify should return true with valid signature # SKIP - ok 94 ECDSA P-384 verify should return false with invalid signature ok 95 ECDSA P-384 generateKey should throw with invalid usages # SKIP - ok 96 ECDSA P-384 generateKey should return CryptoKey # SKIP - ok 97 ECDSA P-384 generateKey should set public key type # SKIP - ok 98 ECDSA P-384 generateKey should set private key type # SKIP - ok 99 ECDSA P-384 generateKey should set public key algorithm # SKIP - ok 100 ECDSA P-384 generateKey should set private key algorithm # SKIP - ok 101 ECDSA P-384 generateKey should set public key algorithm name # SKIP - ok 102 ECDSA P-384 generateKey should set private key algorithm name # SKIP - ok 103 ECDSA P-384 generateKey should set public key algorithm hash name # SKIP - ok 104 ECDSA P-384 generateKey should set private key algorithm hash name # SKIP - ok 105 ECDSA P-384 generateKey should set public key extractable # SKIP - ok 106 ECDSA P-384 generateKey should set private key extractable # SKIP - ok 107 ECDSA P-384 generateKey should set public key usages # SKIP - ok 108 ECDSA P-384 generateKey should set private key usages # SKIP - ok 109 ECDSA P-384 generateKey should set public key handle # SKIP - ok 110 ECDSA P-384 generateKey should set private key handle # SKIP - ok 111 ECDSA P-384 importKey with "jwk" format private key and invalid usages should throw SyntaxError ok 112 ECDSA P-384 importKey with "jwk" format non-private key and invalid usages should throw SyntaxError ok 113 ECDSA P-384 importKey with "jwk" format invalid key type should throw DataError ok 114 ECDSA P-384 importKey with "jwk" format invalid key use should throw DataError ok 115 ECDSA P-384 importKey with "jwk" format private P-384 key should define type ok 116 ECDSA P-384 importKey with "jwk" format private P-384 key should define algorithm ok 117 ECDSA P-384 importKey with "jwk" format private P-384 key should define extractable ok 118 ECDSA P-384 importKey with "jwk" format private P-384 key should define usages ok 119 ECDSA P-384 importKey with "jwk" format private P-384 key should define handle ok 120 ECDSA P-384 importKey with "jwk" format public P-384 key should define type ok 121 ECDSA P-384 importKey with "jwk" format public P-384 key should define algorithm ok 122 ECDSA P-384 importKey with "jwk" format public P-384 key should define extractable ok 123 ECDSA P-384 importKey with "jwk" format public P-384 key should define usages ok 124 ECDSA P-384 importKey with "jwk" format public P-384 key should define handle ok 125 ECDSA P-384 importKey with other format should throw NotSupportedError ok 126 ECDSA P-384 exportKey with missing key material should throw OperationError ok 127 ECDSA P-384 exportKey with "jwk" format P-384 curve should set "crv" to "P-384" ok 128 ECDSA P-384 exportKey with "raw" format P-384 curve return the handle of CryptoKey ok 129 ECDSA P-384 exportKey with other format should throw NotSupportedError ok 130 ECDSA P-521 dictionaries getter should return an array # SKIP - ok 131 ECDSA P-521 members getter should return an object # SKIP - ok 132 ECDSA P-521 sign should throw with non-private key ok 133 ECDSA P-521 sign should return an ArrayBuffer ok 134 ECDSA P-521 sign should return a ECDSA signature # SKIP - ok 135 ECDSA P-521 verify should throw with non-private key ok 136 ECDSA P-521 verify should return true with valid signature # SKIP - ok 137 ECDSA P-521 verify should return false with invalid signature ok 138 ECDSA P-521 generateKey should throw with invalid usages # SKIP - ok 139 ECDSA P-521 generateKey should return CryptoKey # SKIP - ok 140 ECDSA P-521 generateKey should set public key type # SKIP - ok 141 ECDSA P-521 generateKey should set private key type # SKIP - ok 142 ECDSA P-521 generateKey should set public key algorithm # SKIP - ok 143 ECDSA P-521 generateKey should set private key algorithm # SKIP - ok 144 ECDSA P-521 generateKey should set public key algorithm name # SKIP - ok 145 ECDSA P-521 generateKey should set private key algorithm name # SKIP - ok 146 ECDSA P-521 generateKey should set public key algorithm hash name # SKIP - ok 147 ECDSA P-521 generateKey should set private key algorithm hash name # SKIP - ok 148 ECDSA P-521 generateKey should set public key extractable # SKIP - ok 149 ECDSA P-521 generateKey should set private key extractable # SKIP - ok 150 ECDSA P-521 generateKey should set public key usages # SKIP - ok 151 ECDSA P-521 generateKey should set private key usages # SKIP - ok 152 ECDSA P-521 generateKey should set public key handle # SKIP - ok 153 ECDSA P-521 generateKey should set private key handle # SKIP - ok 154 ECDSA P-521 importKey with "jwk" format private key and invalid usages should throw SyntaxError ok 155 ECDSA P-521 importKey with "jwk" format non-private key and invalid usages should throw SyntaxError ok 156 ECDSA P-521 importKey with "jwk" format invalid key type should throw DataError ok 157 ECDSA P-521 importKey with "jwk" format invalid key use should throw DataError ok 158 ECDSA P-521 importKey with "jwk" format private P-521 key should define type ok 159 ECDSA P-521 importKey with "jwk" format private P-521 key should define algorithm ok 160 ECDSA P-521 importKey with "jwk" format private P-521 key should define extractable ok 161 ECDSA P-521 importKey with "jwk" format private P-521 key should define usages ok 162 ECDSA P-521 importKey with "jwk" format private P-521 key should define handle ok 163 ECDSA P-521 importKey with "jwk" format public P-521 key should define type ok 164 ECDSA P-521 importKey with "jwk" format public P-521 key should define algorithm ok 165 ECDSA P-521 importKey with "jwk" format public P-521 key should define extractable ok 166 ECDSA P-521 importKey with "jwk" format public P-521 key should define usages ok 167 ECDSA P-521 importKey with "jwk" format public P-521 key should define handle ok 168 ECDSA P-521 importKey with other format should throw NotSupportedError ok 169 ECDSA P-521 exportKey with missing key material should throw OperationError ok 170 ECDSA P-521 exportKey with "jwk" format P-521 curve should set "crv" to "P-521" ok 171 ECDSA P-521 exportKey with "raw" format P-521 curve return the handle of CryptoKey ok 172 ECDSA P-521 exportKey with other format should throw NotSupportedError # tests 92 # pass 92 # fail 0 ok test/algorithms/EDDSASpec.js .................... 1..51 ok 1 EDDSA dictionaries getter should return an array # SKIP - ok 2 EDDSA members getter should return an object # SKIP - ok 3 EDDSA sign should throw with non-private key ok 4 EDDSA sign should return an ArrayBuffer ok 5 EDDSA sign should return an EDDSA signature ok 6 EDDSA sign should throw with invalid data type ok 7 EDDSA verify should throw with non-private key ok 8 EDDSA verify should return true with valid signature ok 9 EDDSA verify should return false with invalid signature ok 10 EDDSA generateKey should throw with invalid usages ok 11 EDDSA generateKey should return CryptoKey ok 12 EDDSA generateKey should set public key type ok 13 EDDSA generateKey should set private key type ok 14 EDDSA generateKey should set public key algorithm ok 15 EDDSA generateKey should set private key algorithm ok 16 EDDSA generateKey should set public key algorithm name ok 17 EDDSA generateKey should set private key algorithm name ok 18 EDDSA generateKey should set public key extractable ok 19 EDDSA generateKey should set private key extractable ok 20 EDDSA generateKey should set public key usages ok 21 EDDSA generateKey should set private key usages ok 22 EDDSA importKey with "jwk" format private key and invalid usages should throw SyntaxError ok 23 EDDSA importKey with "jwk" format non-private key and invalid usages should throw SyntaxError ok 24 EDDSA importKey with "jwk" format invalid key type should throw DataError ok 25 EDDSA importKey with "jwk" format invalid key use should throw DataError ok 26 EDDSA importKey with "jwk" format private Ed25519 key should define type ok 27 EDDSA importKey with "jwk" format private Ed25519 key should define algorithm ok 28 EDDSA importKey with "jwk" format private Ed25519 key should define extractable ok 29 EDDSA importKey with "jwk" format private Ed25519 key should define usages ok 30 EDDSA importKey with "jwk" format public Ed25519 key should define type ok 31 EDDSA importKey with "jwk" format public Ed25519 key should define algorithm ok 32 EDDSA importKey with "jwk" format public Ed25519 key should define extractable ok 33 EDDSA importKey with "jwk" format public Ed25519 key should define usages ok 34 EDDSA importKey with "hex" format private key and invalid usages should throw SyntaxError ok 35 EDDSA importKey with "hex" format non-private key and invalid usages should throw SyntaxError ok 36 EDDSA importKey with "hex" format invalid key type should throw DataError ok 37 EDDSA importKey with "hex" format invalid key use should throw DataError ok 38 EDDSA importKey with "hex" format private Ed25519 key should define type ok 39 EDDSA importKey with "hex" format private Ed25519 key should define algorithm ok 40 EDDSA importKey with "hex" format private Ed25519 key should define extractable ok 41 EDDSA importKey with "hex" format private Ed25519 key should define usages ok 42 EDDSA importKey with "hex" format public Ed25519 key should define type ok 43 EDDSA importKey with "hex" format public Ed25519 key should define algorithm ok 44 EDDSA importKey with "hex" format public Ed25519 key should define extractable ok 45 EDDSA importKey with "hex" format public Ed25519 key should define usages ok 46 EDDSA importKey with other format should throw NotSupportedError ok 47 EDDSA exportKey with missing key material should throw OperationError ok 48 EDDSA exportKey with "jwk" format should return a valid key ok 49 EDDSA exportKey with "raw" format should return a valid key ok 50 EDDSA exportKey with "hex" format should return a valid key ok 51 EDDSA exportKey with other format should throw NotSupportedError # tests 49 # pass 49 # fail 0 ok test/algorithms/HMACSpec.js ..................... 1..32 ok 1 HMAC dictionaries getter should return an array ok 2 HMAC members getter should return an object ok 3 HMAC sign should return an ArrayBuffer ok 4 HMAC sign should return a HMAC signature ok 5 HMAC verify should verify a valid HMAC signature ok 6 HMAC verify should not verify an invalid HMAC signature ok 7 HMAC generateKey should throw with invalid usages ok 8 HMAC generateKey should throw with invalid length ok 9 HMAC generateKey should return CryptoKey ok 10 HMAC generateKey should set key type ok 11 HMAC generateKey should set key algorithm ok 12 HMAC generateKey should set key algorithm name ok 13 HMAC generateKey should set key algorithm hash ok 14 HMAC generateKey should set key algorithm hash name ok 15 HMAC generateKey should set key extractable ok 16 HMAC generateKey should set key usages ok 17 HMAC generateKey should set key handle ok 18 HMAC importKey should throw with invalid usages ok 19 HMAC importKey should throw with missing algorithm hash ok 20 HMAC importKey should throw with unsupported key format ok 21 HMAC importKey should throw with empty key data ok 22 HMAC importKey should import raw key data and return a CryptoKey ok 23 HMAC importKey should set key type ok 24 HMAC importKey should set key algorithm ok 25 HMAC importKey should set key algorithm name ok 26 HMAC importKey should set key algorithm hash name ok 27 HMAC importKey should set key extractable ok 28 HMAC importKey should set key usages ok 29 HMAC importKey should set key handle ok 30 HMAC exportKey should throw with invalid usages ok 31 HMAC exportKey should throw with unsupported key format ok 32 HMAC exportKey should return a raw key # tests 32 # pass 32 # fail 0 ok test/algorithms/RSA-OAEPspec.js ................. 1..49 ok 1 RSA_OAEP dictionaries getter should return an array # SKIP - ok 2 RSA_OAEP members getter should return an object # SKIP - ok 3 RSA_OAEP encrypt should throw with non-private key ok 4 RSA_OAEP encrypt should return an ArrayBuffer ok 5 RSA_OAEP decrypt should throw with non-private key ok 6 RSA_OAEP decrypt should return an ArrayBuffer ok 7 RSA_OAEP decrypt should return a valid decryption ok 8 RSA_OAEP generateKey should throw with invalid usages # SKIP - ok 9 RSA_OAEP generateKey should return CryptoKey # SKIP - ok 10 RSA_OAEP generateKey should set public key type # SKIP - ok 11 RSA_OAEP generateKey should set private key type # SKIP - ok 12 RSA_OAEP generateKey should set public key algorithm # SKIP - ok 13 RSA_OAEP generateKey should set private key algorithm # SKIP - ok 14 RSA_OAEP generateKey should set public key algorithm name # SKIP - ok 15 RSA_OAEP generateKey should set private key algorithm name # SKIP - ok 16 RSA_OAEP generateKey should set public key algorithm hash name # SKIP - ok 17 RSA_OAEP generateKey should set private key algorithm hash name # SKIP - ok 18 RSA_OAEP generateKey should set public key extractable # SKIP - ok 19 RSA_OAEP generateKey should set private key extractable # SKIP - ok 20 RSA_OAEP generateKey should set public key usages # SKIP - ok 21 RSA_OAEP generateKey should set private key usages # SKIP - ok 22 RSA_OAEP generateKey should set public key handle # SKIP - ok 23 RSA_OAEP generateKey should set private key handle # SKIP - ok 24 RSA_OAEP importKey with "jwk" format private key and invalid usages should throw SyntaxError ok 25 RSA_OAEP importKey with "jwk" format non-private key and invalid usages should throw SyntaxError ok 26 RSA_OAEP importKey with "jwk" format invalid key type should throw DataError ok 27 RSA_OAEP importKey with "jwk" format invalid key use should throw DataError ok 28 RSA_OAEP importKey with "jwk" format RSA-OAEP key alg should set SHA-1 hash ok 29 RSA_OAEP importKey with "jwk" format RSA-OAEP-256 key alg should set SHA-256 hash ok 30 RSA_OAEP importKey with "jwk" format RSA-OAEP-384 key alg should set SHA-384 hash ok 31 RSA_OAEP importKey with "jwk" format RSA-OAEP-512 key alg should set SHA-512 hash ok 32 RSA_OAEP importKey with "jwk" format invalid key alg should throw DataError ok 33 RSA_OAEP importKey with "jwk" format private RSA key should define type ok 34 RSA_OAEP importKey with "jwk" format private RSA key should define algorithm ok 35 RSA_OAEP importKey with "jwk" format private RSA key should define extractable ok 36 RSA_OAEP importKey with "jwk" format private RSA key should define usages ok 37 RSA_OAEP importKey with "jwk" format private RSA key should define handle ok 38 RSA_OAEP importKey with "jwk" format public RSA key should define type ok 39 RSA_OAEP importKey with "jwk" format public RSA key should define algorithm ok 40 RSA_OAEP importKey with "jwk" format public RSA key should define extractable ok 41 RSA_OAEP importKey with "jwk" format public RSA key should define usages ok 42 RSA_OAEP importKey with "jwk" format public RSA key should define handle ok 43 RSA_OAEP importKey with other format should throw NotSupportedError ok 44 RSA_OAEP exportKey with missing key material should throw OperationError ok 45 RSA_OAEP exportKey with "jwk" format SHA-1 hash should set "alg" to "RSA-OAEP" ok 46 RSA_OAEP exportKey with "jwk" format SHA-256 hash should set "alg" to "RSA-OAEP-256" ok 47 RSA_OAEP exportKey with "jwk" format SHA-384 hash should set "alg" to "RSA-OAEP-384" ok 48 RSA_OAEP exportKey with "jwk" format SHA-512 hash should set "alg" to "RSA-OAEP-512" ok 49 RSA_OAEP exportKey with other format should throw NotSupportedError # tests 31 # pass 31 # fail 0 ok test/algorithms/RSA-PSSSpec.js .................. 1..61 ok 1 dictionaries getter should return an array # SKIP - ok 2 members getter should return an object # SKIP - ok 3 sign should throw with non-private key ok 4 sign should return an ArrayBuffer ok 5 sign should return a correct length RSA-PSS SHA-1 signature ok 6 sign should return a correct length RSA-PSS SHA-256 signature ok 7 sign should return a correct length RSA-PSS SHA-384 signature ok 8 sign should return a correct length RSA-PSS SHA-512 signature ok 9 verify should throw with non-private key ok 10 verify should return false with invalid signature ok 11 verify should return true with valid SHA-1 signature ok 12 verify should return true with valid SHA-256 signature ok 13 verify should return true with valid SHA-384 signature ok 14 verify should return true with valid SHA-512 signature ok 15 generateKey should throw with invalid usages # SKIP - ok 16 generateKey should return CryptoKey # SKIP - ok 17 generateKey should set public key type # SKIP - ok 18 generateKey should set private key type # SKIP - ok 19 generateKey should set public key algorithm # SKIP - ok 20 generateKey should set private key algorithm # SKIP - ok 21 generateKey should set public key algorithm name # SKIP - ok 22 generateKey should set private key algorithm name # SKIP - ok 23 generateKey should set public key algorithm hash name # SKIP - ok 24 generateKey should set private key algorithm hash name # SKIP - ok 25 generateKey should set public key extractable # SKIP - ok 26 generateKey should set private key extractable # SKIP - ok 27 generateKey should set public key usages # SKIP - ok 28 generateKey should set private key usages # SKIP - ok 29 generateKey should set public key handle # SKIP - ok 30 generateKey should set private key handle # SKIP - ok 31 importKey with "jwk" format private key and invalid usages should throw SyntaxError ok 32 importKey with "jwk" format non-private key and invalid usages should throw SyntaxError ok 33 importKey with "jwk" format invalid key type should throw DataError ok 34 importKey with "jwk" format invalid key use should throw DataError ok 35 importKey with "jwk" format PS1 key alg should set SHA-1 hash ok 36 importKey with "jwk" format PS256 key alg should set SHA-256 hash ok 37 importKey with "jwk" format PS384 key alg should set SHA-384 hash ok 38 importKey with "jwk" format PS512 key alg should set SHA-512 hash ok 39 importKey with "jwk" format invalid key alg should throw DataError ok 40 importKey with "jwk" format undefined key alg should not define hash # SKIP - ok 41 importKey with "jwk" format private RSA key should define type ok 42 importKey with "jwk" format private RSA key should define algorithm ok 43 importKey with "jwk" format private RSA key should define modulusLength ok 44 importKey with "jwk" format private RSA key should define publicExponent ok 45 importKey with "jwk" format private RSA key should define extractable ok 46 importKey with "jwk" format private RSA key should define usages ok 47 importKey with "jwk" format private RSA key should define handle ok 48 importKey with "jwk" format public RSA key should define type ok 49 importKey with "jwk" format public RSA key should define algorithm ok 50 importKey with "jwk" format public RSA key should define modulusLength ok 51 importKey with "jwk" format public RSA key should define publicExponent ok 52 importKey with "jwk" format public RSA key should define extractable ok 53 importKey with "jwk" format public RSA key should define usages ok 54 importKey with "jwk" format public RSA key should define handle ok 55 importKey with other format should throw NotSupportedError ok 56 exportKey with missing key material should throw OperationError ok 57 exportKey with "jwk" format SHA-1 hash should set "alg" to "PS1" ok 58 exportKey with "jwk" format SHA-256 hash should set "alg" to "PS256" ok 59 exportKey with "jwk" format SHA-384 hash should set "alg" to "PS384" ok 60 exportKey with "jwk" format SHA-512 hash should set "alg" to "PS512" ok 61 exportKey with other format should throw NotSupportedError # tests 42 # pass 42 # fail 0 ok test/algorithms/RSASSA-PKCS1-v1_5_Spec.js ....... 1..61 ok 1 dictionaries getter should return an array # SKIP - ok 2 members getter should return an object # SKIP - ok 3 sign should throw with non-private key ok 4 sign should return an ArrayBuffer ok 5 sign should return a RSASSA-PKCS1-v1_5 SHA-1 signature ok 6 sign should return a RSASSA-PKCS1-v1_5 SHA-256 signature ok 7 sign should return a RSASSA-PKCS1-v1_5 SHA-384 signature ok 8 sign should return a RSASSA-PKCS1-v1_5 SHA-512 signature ok 9 verify should throw with non-private key ok 10 verify should return false with invalid signature ok 11 verify should return true with valid SHA-1 signature ok 12 verify should return true with valid SHA-256 signature ok 13 verify should return true with valid SHA-384 signature ok 14 verify should return true with valid SHA-512 signature ok 15 generateKey should throw with invalid usages # SKIP - ok 16 generateKey should return CryptoKey # SKIP - ok 17 generateKey should set public key type # SKIP - ok 18 generateKey should set private key type # SKIP - ok 19 generateKey should set public key algorithm # SKIP - ok 20 generateKey should set private key algorithm # SKIP - ok 21 generateKey should set public key algorithm name # SKIP - ok 22 generateKey should set private key algorithm name # SKIP - ok 23 generateKey should set public key algorithm hash name # SKIP - ok 24 generateKey should set private key algorithm hash name # SKIP - ok 25 generateKey should set public key extractable # SKIP - ok 26 generateKey should set private key extractable # SKIP - ok 27 generateKey should set public key usages # SKIP - ok 28 generateKey should set private key usages # SKIP - ok 29 generateKey should set public key handle # SKIP - ok 30 generateKey should set private key handle # SKIP - ok 31 importKey with "jwk" format private key and invalid usages should throw SyntaxError ok 32 importKey with "jwk" format non-private key and invalid usages should throw SyntaxError ok 33 importKey with "jwk" format invalid key type should throw DataError ok 34 importKey with "jwk" format invalid key use should throw DataError ok 35 importKey with "jwk" format RS1 key alg should set SHA-1 hash ok 36 importKey with "jwk" format RS256 key alg should set SHA-256 hash ok 37 importKey with "jwk" format RS384 key alg should set SHA-384 hash ok 38 importKey with "jwk" format RS512 key alg should set SHA-512 hash ok 39 importKey with "jwk" format invalid key alg should throw DataError ok 40 importKey with "jwk" format undefined key alg should not define hash # SKIP - ok 41 importKey with "jwk" format private RSA key should define type ok 42 importKey with "jwk" format private RSA key should define algorithm ok 43 importKey with "jwk" format private RSA key should define modulusLength ok 44 importKey with "jwk" format private RSA key should define publicExponent ok 45 importKey with "jwk" format private RSA key should define extractable ok 46 importKey with "jwk" format private RSA key should define usages ok 47 importKey with "jwk" format private RSA key should define handle ok 48 importKey with "jwk" format public RSA key should define type ok 49 importKey with "jwk" format public RSA key should define algorithm ok 50 importKey with "jwk" format public RSA key should define modulusLength ok 51 importKey with "jwk" format public RSA key should define publicExponent ok 52 importKey with "jwk" format public RSA key should define extractable ok 53 importKey with "jwk" format public RSA key should define usages ok 54 importKey with "jwk" format public RSA key should define handle ok 55 importKey with other format should throw NotSupportedError ok 56 exportKey with missing key material should throw OperationError ok 57 exportKey with "jwk" format SHA-1 hash should set "alg" to "RS1" ok 58 exportKey with "jwk" format SHA-256 hash should set "alg" to "RS256" ok 59 exportKey with "jwk" format SHA-384 hash should set "alg" to "RS384" ok 60 exportKey with "jwk" format SHA-512 hash should set "alg" to "RS512" ok 61 exportKey with other format should throw NotSupportedError # tests 42 # pass 42 # fail 0 ok test/algorithms/RegisteredAlgorithmsSpec.js ..... 1..4 ok 1 RegisteredAlgorithms constructor should assign object argument properties ok 2 RegisteredAlgorithms getCaseInsensitive should match a known property with exact case ok 3 RegisteredAlgorithms getCaseInsensitive should match a known property with different case ok 4 RegisteredAlgorithms getCaseInsensitive should return "undefined" with no match # tests 4 # pass 4 # fail 0 ok test/algorithms/SHASpec.js ...................... 1..8 ok 1 SHA dictionaries getter should return an array ok 2 SHA members getter should return an object ok 3 SHA digest should return an ArrayBuffer ok 4 SHA digest should return a SHA-1 digest ok 5 SHA digest should return a SHA-256 digest ok 6 SHA digest should return a SHA-384 digest ok 7 SHA digest should return a SHA-512 digest ok 8 SHA digest should throw an OperationError with unknown algorithm # tests 8 # pass 8 # fail 0 ok test/algorithms/SupportedAlgorithmsSpec.js ...... 1..9 ok 1 SupportedAlgorithms constructor should initialize a container for each operation ok 2 SupportedAlgorithms operations should include specified operations ok 3 SupportedAlgorithms define should registered a type for an operation of an algorithm ok 4 SupportedAlgorithms normalize with string "alg" argument unknown algorithm should return an error ok 5 SupportedAlgorithms normalize with string "alg" argument valid algorithm should return the normalized algorithm ok 6 SupportedAlgorithms normalize with object "alg" argument invalid "name" should return an error ok 7 SupportedAlgorithms normalize with object "alg" argument unknown algorithm should return a NotSupportedError ok 8 SupportedAlgorithms normalize with object "alg" argument invalid param should return an error # SKIP - ok 9 SupportedAlgorithms normalize with object "alg" argument valid params should return the normalized algorithm # tests 8 # pass 8 # fail 0 ok test/dictionaries/AlgorithmSpec.js .............. 1..3 ok 1 Algorithm constructor with string "algorithm" argument should set instance name to argument value ok 2 Algorithm constructor with object "algorithm" argument should assign argument property values to instance ok 3 Algorithm constructor with object "algorithm" argument should require algorithm name to be a string # tests 3 # pass 3 # fail 0 ok test/dictionaries/HmacKeyAlgorithmSpec.js ....... skipped: (no reason given) test/dictionaries/KeyAlgorithmSpec.js ........... 1..2 ok 1 KeyAlgorithm constructor should assign argument property values to instance ok 2 KeyAlgorithm constructor should require algorithm name # tests 2 # pass 2 # fail 0 ok test/dictionaries/RsaHashedKeyAlgorithmSpec.js .. skipped: (no reason given) test/dictionaries/ShaKeyAlgorithmSpec.js ........ skipped: (no reason given) test/keys/CryptoKeyPairSpec.js .................. skipped: (no reason given) test/keys/CryptoKeySpec.js ...................... skipped: (no reason given) test/keys/JsonWebKeySpec.js ..................... skipped: (no reason given) test/keys/recognizedKeyUsagesSpec.js ............ 1..3 ok 1 recognizedKeyUsages constructor should initialize the list ok 2 recognizedKeyUsages normalize should include recognized usages ok 3 recognizedKeyUsages normalize should ignore unknown usages # tests 3 # pass 3 # fail 0 ok All tests successful. Files=27, Tests=756, 56 wallclock secs ( 0.21 usr 0.06 sys + 52.62 cusr 3.66 csys = 56.55 CPU) Result: PASS make[1]: Leaving directory '/build/node-trust-webcrypto-gzQIEU/node-trust-webcrypto-0.9.2' dh_testroot -i dh_prep -i dh_install -i debian/rules override_dh_installdocs make[1]: Entering directory '/build/node-trust-webcrypto-gzQIEU/node-trust-webcrypto-0.9.2' dh_installdocs --all -- README.html README.txt make[1]: Leaving directory '/build/node-trust-webcrypto-gzQIEU/node-trust-webcrypto-0.9.2' dh_installchangelogs -i dh_perl -i dh_link -i dh_strip_nondeterminism -i dh_compress -i dh_fixperms -i dh_missing -i dh_installdeb -i dh_gencontrol -i dh_md5sums -i dh_builddeb -i dpkg-deb: building package 'node-trust-webcrypto' in '../node-trust-webcrypto_0.9.2-1_all.deb'. dpkg-genbuildinfo --build=all dpkg-genchanges --build=all >../node-trust-webcrypto_0.9.2-1_all.changes dpkg-genchanges: info: binary-only arch-indep upload (source code and arch-specific packages not included) dpkg-source --after-build . dpkg-buildpackage: info: binary-only upload (no source included) I: running special hook: sync-out /build/node-trust-webcrypto-gzQIEU /tmp/node-trust-webcrypto-0.9.2-11j04xfbu I: cleaning package lists and apt cache... I: creating tarball... I: done I: removing tempdir /tmp/mmdebstrap.Vbz0ifIzoL... I: success in 366.9792 seconds md5: node-trust-webcrypto_0.9.2-1_all.deb: OK sha1: node-trust-webcrypto_0.9.2-1_all.deb: OK sha256: node-trust-webcrypto_0.9.2-1_all.deb: OK Checksums: OK