Source: node-trust-webcrypto Version: 0.9.2-1 Severity: serious Justification: FTBFS Tags: bookworm sid ftbfs User: lu...@debian.org Usertags: ftbfs-20211220 ftbfs-bookworm
Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part (hopefully): > make[1]: Entering directory '/<<PKGBUILDDIR>>' > NODE_ENV=test prove --verbose \ > --exec "mocha --reporter=tap" \ > test/*.js test/*/*.js > test/CryptoSpec.js .............................. > ok 1 Crypto getRandomValues should return the typed array argument > ok 2 Crypto getRandomValues should write random values to the typed array > ok 3 Crypto subtle should return a SubtleCrypto instance > # tests 3 > # pass 3 > # fail 0 > 1..3 > ok > > Error: Invalid type > at SupportedKeyTypes.normalize > (/usr/share/nodejs/@trust/keyto/src/types/SupportedKeyTypes.js:70:13) > at Key.get alg [as alg] > (/usr/share/nodejs/@trust/keyto/src/index.js:314:65) > at Key.parseKey (/usr/share/nodejs/@trust/keyto/src/index.js:336:11) > at new Key (/usr/share/nodejs/@trust/keyto/src/index.js:123:21) > at Function.from (/usr/share/nodejs/@trust/keyto/src/index.js:209:14) > at ECDSA.importKey (/<<PKGBUILDDIR>>/src/algorithms/ECDSA.js:301:27) > at Object.<anonymous> > (/<<PKGBUILDDIR>>/test/EcdsaKeyPairsForTesting.js:17:41) > at Module._compile (internal/modules/cjs/loader.js:999:30) > at Object.Module._extensions..js (internal/modules/cjs/loader.js:1027:10) > at Module.load (internal/modules/cjs/loader.js:863:32) > at Function.Module._load (internal/modules/cjs/loader.js:708:14) > at ModuleWrap.<anonymous> (internal/modules/esm/translators.js:188:29) > at ModuleJob.run (internal/modules/esm/module_job.js:145:37) > at async Loader.import (internal/modules/esm/loader.js:182:24) > at async formattedImport > (/usr/share/nodejs/mocha/lib/nodejs/esm-utils.js:7:14) > at async Object.exports.requireOrImport > (/usr/share/nodejs/mocha/lib/nodejs/esm-utils.js:48:32) > at async Object.exports.loadFilesAsync > (/usr/share/nodejs/mocha/lib/nodejs/esm-utils.js:88:20) > at async singleRun (/usr/share/nodejs/mocha/lib/cli/run-helpers.js:125:3) > at async Object.exports.handler > (/usr/share/nodejs/mocha/lib/cli/run.js:374:5) > test/EcdsaKeyPairsForTesting.js ................. > Dubious, test returned 1 (wstat 256, 0x100) > No subtests run > test/RsaKeyPairForPSSTesting.js ................. skipped: (no reason given) > test/RsaKeyPairForTesting.js .................... skipped: (no reason given) > (node:934098) [DEP0005] DeprecationWarning: Buffer() is deprecated due to > security and usability issues. Please use the Buffer.alloc(), > Buffer.allocUnsafe(), or Buffer.from() methods instead. > test/SubtleCryptoSpec.js ........................ > ok 1 SubtleCrypto encrypt with invalid algorithm should return a promise > ok 2 SubtleCrypto encrypt with invalid algorithm should reject the promise > ok 3 SubtleCrypto encrypt with mismatched algorithm name should return a > promise > ok 4 SubtleCrypto encrypt with mismatched algorithm name should reject the > promise > ok 5 SubtleCrypto encrypt with invalid usages should return a promise > ok 6 SubtleCrypto encrypt with invalid usages should reject the promise > ok 7 SubtleCrypto encrypt with valid arguments should return a promise > ok 8 SubtleCrypto encrypt with valid arguments should resolve an ArrayBuffer > ok 9 SubtleCrypto encrypt with valid arguments should resolve a correct > encryption for the data and key > ok 10 SubtleCrypto encrypt with valid arguments should not reject the promise > ok 11 SubtleCrypto decrypt with invalid algorithm should return a promise > ok 12 SubtleCrypto decrypt with invalid algorithm should reject the promise > ok 13 SubtleCrypto decrypt with mismatched algorithm name should return a > promise > ok 14 SubtleCrypto decrypt with mismatched algorithm name should reject the > promise > ok 15 SubtleCrypto decrypt with invalid usages should return a promise > ok 16 SubtleCrypto decrypt with invalid usages should reject the promise > ok 17 SubtleCrypto decrypt with valid arguments should return a promise > ok 18 SubtleCrypto decrypt with valid arguments should resolve a correct > decryption for the data and key > ok 19 SubtleCrypto decrypt with valid arguments should not reject the promise > ok 20 SubtleCrypto sign with invalid algorithm should return a promise > ok 21 SubtleCrypto sign with invalid algorithm should reject the promise > ok 22 SubtleCrypto sign with mismatched algorithm name should return a promise > ok 23 SubtleCrypto sign with mismatched algorithm name should reject the > promise > ok 24 SubtleCrypto sign with invalid usages should return a promise > ok 25 SubtleCrypto sign with invalid usages should reject the promise > ok 26 SubtleCrypto sign with valid arguments should return a promise > ok 27 SubtleCrypto sign with valid arguments should resolve an ArrayBuffer > ok 28 SubtleCrypto sign with valid arguments should resolve a correct > signature for the data and key > ok 29 SubtleCrypto sign with valid arguments should not reject the promise > ok 30 SubtleCrypto verify with invalid algorithm should return a promise > ok 31 SubtleCrypto verify with invalid algorithm should reject the promise > ok 32 SubtleCrypto verify with mismatched algorithm name should return a > promise > ok 33 SubtleCrypto verify with mismatched algorithm name should reject the > promise > ok 34 SubtleCrypto verify with invalid usages should return a promise > ok 35 SubtleCrypto verify with invalid usages should reject the promise > ok 36 SubtleCrypto verify with valid arguments should return a promise > ok 37 SubtleCrypto verify with valid arguments should resolve the promise > ok 38 SubtleCrypto verify with valid arguments should not reject the promise > ok 39 SubtleCrypto digest with invalid algorithm should return a promise > ok 40 SubtleCrypto digest with invalid algorithm should reject the promise > ok 41 SubtleCrypto digest with valid arguments should return a promise > ok 42 SubtleCrypto digest with valid arguments should resolve an ArrayBuffer > ok 43 SubtleCrypto digest with valid arguments should not reject the promise > ok 44 SubtleCrypto generateKey with invalid algorithm should return a promise > ok 45 SubtleCrypto generateKey with invalid algorithm should reject the > promise > ok 46 SubtleCrypto generateKey with invalid CryptoKey usages should return a > promise # SKIP - > ok 47 SubtleCrypto generateKey with invalid CryptoKey usages should reject > the promise # SKIP - > ok 48 SubtleCrypto generateKey with invalid CryptoKeyPair usages should > return a promise # SKIP - > ok 49 SubtleCrypto generateKey with invalid CryptoKeyPair usages should > reject the promise # SKIP - > ok 50 SubtleCrypto generateKey with valid arguments should return a promise > ok 51 SubtleCrypto generateKey with valid arguments should resolve the > promise # SKIP - > ok 52 SubtleCrypto generateKey with valid arguments should not reject the > promise # SKIP - > ok 53 SubtleCrypto deriveKey should return a Promise # SKIP - > ok 54 SubtleCrypto deriveBits should return a Promise # SKIP - > ok 55 SubtleCrypto importKey with invalid algorithm should return a promise > ok 56 SubtleCrypto importKey with invalid algorithm should reject the promise > ok 57 SubtleCrypto importKey with valid arguments should return a promise > ok 58 SubtleCrypto importKey with valid arguments should resolve the promise > ok 59 SubtleCrypto importKey with valid arguments should set extractable > ok 60 SubtleCrypto importKey with valid arguments should normalize key usages > ok 61 SubtleCrypto importKey with valid arguments should not reject the > promise > ok 62 SubtleCrypto exportKey with invalid algorithm should return a promise > ok 63 SubtleCrypto exportKey with invalid algorithm should reject the promise > ok 64 SubtleCrypto exportKey with unextractable key should return a promise > ok 65 SubtleCrypto exportKey with unextractable key should reject the promise > ok 66 SubtleCrypto exportKey with valid arguments should return a promise > ok 67 SubtleCrypto exportKey with valid arguments should resolve the promise > ok 68 SubtleCrypto exportKey with valid arguments should not reject the > promise > ok 69 SubtleCrypto wrapKey with invalid algorithm should return a promise > ok 70 SubtleCrypto wrapKey with invalid algorithm should reject the promise > ok 71 SubtleCrypto wrapKey with invalid name property should reject the > promise # SKIP - > ok 72 SubtleCrypto wrapKey with invalid key ops should reject the promise # > SKIP - > ok 73 SubtleCrypto wrapKey with invalid extractable property should reject > the promise # SKIP - > ok 74 SubtleCrypto wrapKey with valid arguments should return a promise > ok 75 SubtleCrypto wrapKey with valid arguments should resolve the promise > ok 76 SubtleCrypto wrapKey with valid arguments should not reject the promise > ok 77 SubtleCrypto unwrapKey with invalid algorithm should return a promise > ok 78 SubtleCrypto unwrapKey with invalid algorithm should reject the promise > ok 79 SubtleCrypto unwrapKey with invalid name property should reject the > promise # SKIP - > ok 80 SubtleCrypto unwrapKey with invalid key ops should reject the promise # > SKIP - > ok 81 SubtleCrypto unwrapKey with different key arguments should resolve the > promise # SKIP - > ok 82 SubtleCrypto unwrapKey with valid arguments should return a promise > ok 83 SubtleCrypto unwrapKey with valid arguments should resolve the promise > ok 84 SubtleCrypto unwrapKey with valid arguments should not reject the > promise > # tests 70 > # pass 70 > # fail 0 > 1..84 > ok > test/algorithms/AES-CBCSpec.js .................. > ok 1 AES_CBC dictionaries getter should return an array # SKIP - > ok 2 AES_CBC members getter should return an object # SKIP - > ok 3 AES_CBC encrypt should throw with invalid iv length > ok 4 AES_CBC encrypt should return an ArrayBuffer > ok 5 AES_CBC encrypt should return a valid encryption > ok 6 AES_CBC decrypt should throw with invalid iv length > ok 7 AES_CBC decrypt should return an ArrayBuffer > ok 8 AES_CBC decrypt should return a valid encryption > ok 9 AES_CBC generateKey should throw with invalid usages > ok 10 AES_CBC generateKey should throw with invalid paramater length > ok 11 AES_CBC generateKey should return CryptoKey > ok 12 AES_CBC generateKey should be a secret key type > ok 13 AES_CBC generateKey should have AES_CBC type for algorithm > ok 14 AES_CBC generateKey should set algorithm name > ok 15 AES_CBC generateKey should set key as extractable > ok 16 AES_CBC generateKey should set key usages > ok 17 AES_CBC generateKey should have correct length key handle > ok 18 AES_CBC generateKey should generate a random handle each time > ok 19 AES_CBC importKey should expect only "raw" or "jwk" formats > ok 20 AES_CBC importKey with "raw" format should expect a suitable raw length > ok 21 AES_CBC importKey with "raw" format should be a secret key type > ok 22 AES_CBC importKey with "raw" format should have AES_CBC type for > algorithm > ok 23 AES_CBC importKey with "raw" format should set algorithm name > ok 24 AES_CBC importKey with "raw" format should set key as extractable > ok 25 AES_CBC importKey with "raw" format should set key usages > ok 26 AES_CBC importKey with "raw" format should have correct length key > handle > ok 27 AES_CBC importKey with "jwk" format should expect a suitable jwk format > ok 28 AES_CBC importKey with "jwk" format should expect correct kty format > ok 29 AES_CBC importKey with "jwk" format should expect data in k property > ok 30 AES_CBC importKey with "jwk" format should expect A128CBC when data > length is 16 > ok 31 AES_CBC importKey with "jwk" format should expect A192CBC when data > length is 24 > ok 32 AES_CBC importKey with "jwk" format should expect A256CBC when data > length is 32 > ok 33 AES_CBC importKey with "jwk" format should expect mismatched length > when k is not appropriate base64url > ok 34 AES_CBC importKey with "jwk" format should expect correct value when > "use" field is used > ok 35 AES_CBC importKey with "jwk" format should expect valid key operations > ok 36 AES_CBC importKey with "jwk" format should expect non extractable to > not be extractable > ok 37 AES_CBC importKey with "jwk" format should be a secret key type > ok 38 AES_CBC importKey with "jwk" format should have AES_CBC type for > algorithm > ok 39 AES_CBC importKey with "jwk" format should set algorithm name > ok 40 AES_CBC importKey with "jwk" format should set key as extractable > ok 41 AES_CBC importKey with "jwk" format should set key usages > ok 42 AES_CBC importKey with "jwk" format should have correct length key > handle > ok 43 AES_CBC exportKey should have a valid handle in the key > ok 44 AES_CBC exportKey should expect only "raw" or "jwk" formats > ok 45 AES_CBC exportKey with "raw" format should return a valid object > ok 46 AES_CBC exportKey with "jwk" format should return a valid object > ok 47 AES_CBC exportKey with "jwk" format should expect correct kty field > ok 48 AES_CBC exportKey with "jwk" format should expect A128CBC when data > length is 16 > ok 49 AES_CBC exportKey with "jwk" format should expect A192CBC when data > length is 24 > ok 50 AES_CBC exportKey with "jwk" format should expect A256CBC when data > length is 32 > # tests 48 > # pass 48 > # fail 0 > 1..50 > ok > test/algorithms/AES-CTRSpec.js .................. > ok 1 AES_CTR dictionaries getter should return an array # SKIP - > ok 2 AES_CTR members getter should return an object # SKIP - > ok 3 AES_CTR encrypt should throw with empty counter > ok 4 AES_CTR encrypt should throw with invalid counter > ok 5 AES_CTR encrypt should throw with length value > ok 6 AES_CTR encrypt should return an ArrayBuffer > ok 7 AES_CTR encrypt should return a valid encryption > ok 8 AES_CTR decrypt should throw with empty counter > ok 9 AES_CTR decrypt should throw with invalid counter > ok 10 AES_CTR decrypt should throw with invalid length value > ok 11 AES_CTR decrypt should return an ArrayBuffer > ok 12 AES_CTR decrypt should return a valid decryption > ok 13 AES_CTR generateKey should throw with invalid usages > ok 14 AES_CTR generateKey should throw with invalid parameter length > ok 15 AES_CTR generateKey should return CryptoKey > ok 16 AES_CTR generateKey should be a secret key type > ok 17 AES_CTR generateKey should have AES_CTR type for algorithm > ok 18 AES_CTR generateKey should set algorithm name > ok 19 AES_CTR generateKey should set key as extractable > ok 20 AES_CTR generateKey should set key usages > ok 21 AES_CTR generateKey should have correct length key handle > ok 22 AES_CTR generateKey should generate a random handle each time > ok 23 AES_CTR importKey should throw with invalid usages > ok 24 AES_CTR importKey should expect only "raw" or "jwk" formats > ok 25 AES_CTR importKey with "raw" format should expect a suitable raw length > ok 26 AES_CTR importKey with "raw" format should be a secret key type > ok 27 AES_CTR importKey with "raw" format should have AES_CTR type for > algorithm > ok 28 AES_CTR importKey with "raw" format should set algorithm name > ok 29 AES_CTR importKey with "raw" format should set key as extractable > ok 30 AES_CTR importKey with "raw" format should set key usages > ok 31 AES_CTR importKey with "raw" format should have correct length key > handle > ok 32 AES_CTR importKey with "jwk" format should expect a suitable jwk format > ok 33 AES_CTR importKey with "jwk" format should expect correct kty format > ok 34 AES_CTR importKey with "jwk" format should expect data in k property > ok 35 AES_CTR importKey with "jwk" format should expect A128CTR when data > length is 16 > ok 36 AES_CTR importKey with "jwk" format should expect A192CTR when data > length is 24 > ok 37 AES_CTR importKey with "jwk" format should expect A256CTR when data > length is 32 > ok 38 AES_CTR importKey with "jwk" format should expect mismatched length > when k is not appropriate base64url > ok 39 AES_CTR importKey with "jwk" format should expect correct value when > "use" field is used > ok 40 AES_CTR importKey with "jwk" format should expect valid key operations > ok 41 AES_CTR importKey with "jwk" format should expect non extractable to > not be extractable > ok 42 AES_CTR importKey with "jwk" format should be a secret key type > ok 43 AES_CTR importKey with "jwk" format should have AES_CTR type for > algorithm > ok 44 AES_CTR importKey with "jwk" format should set algorithm name > ok 45 AES_CTR importKey with "jwk" format should set key as extractable > ok 46 AES_CTR importKey with "jwk" format should set key usages > ok 47 AES_CTR importKey with "jwk" format should have correct length key > handle > ok 48 AES_CTR exportKey should have a valid handle in the key > ok 49 AES_CTR exportKey should expect only "raw" or "jwk" formats > ok 50 AES_CTR exportKey with "raw" format should return a valid object > ok 51 AES_CTR exportKey with "raw" format should be the same as the Chrome > exported key > ok 52 AES_CTR exportKey with "jwk" format should return a valid object > ok 53 AES_CTR exportKey with "jwk" format should expect correct kty field > ok 54 AES_CTR exportKey with "jwk" format should expect A128CTR when data > length is 16 > ok 55 AES_CTR exportKey with "jwk" format should expect A192CTR when data > length is 24 > ok 56 AES_CTR exportKey with "jwk" format should expect A256CTR when data > length is 32 > # tests 54 > # pass 54 > # fail 0 > 1..56 > ok > test/algorithms/AES-GCMSpec.js .................. > ok 1 AES_GCM dictionaries getter should return an array # SKIP - > ok 2 AES_GCM members getter should return an object # SKIP - > ok 3 AES_GCM encrypt should throw invalid data length > ok 4 AES_GCM encrypt should throw with invalid iv length > ok 5 AES_GCM encrypt should throw with invalid additionalData > ok 6 AES_GCM encrypt should accept an ArrayBuffer > ok 7 AES_GCM encrypt should return an ArrayBuffer > ok 8 AES_GCM encrypt should return a valid encryption > ok 9 AES_GCM decrypt should throw with invalid tagLength > ok 10 AES_GCM decrypt should throw with unsupported tagLength > ok 11 AES_GCM decrypt should throw with invalid data length > ok 12 AES_GCM decrypt should throw with invalid data length > ok 13 AES_GCM decrypt should throw with invalid iv length > ok 14 AES_GCM decrypt should throw with invalid additionalData > ok 15 AES_GCM decrypt should return an ArrayBuffer > ok 16 AES_GCM decrypt should return a valid decryption > ok 17 AES_GCM generateKey should throw with invalid usages > ok 18 AES_GCM generateKey should throw with invalid parameter length > ok 19 AES_GCM generateKey should return CryptoKey > ok 20 AES_GCM generateKey should be a secret key type > ok 21 AES_GCM generateKey should have AES_GCM type for algorithm > ok 22 AES_GCM generateKey should set algorithm name > ok 23 AES_GCM generateKey should set key as extractable > ok 24 AES_GCM generateKey should set key usages > ok 25 AES_GCM generateKey should have correct length key handle > ok 26 AES_GCM generateKey should generate a random handle each time > ok 27 AES_GCM importKey should throw with invalid usages > ok 28 AES_GCM importKey should expect only "raw" or "jwk" formats > ok 29 AES_GCM importKey with "raw" format should expect a suitable raw length > ok 30 AES_GCM importKey with "raw" format should be a secret key type > ok 31 AES_GCM importKey with "raw" format should have AES_GCM type for > algorithm > ok 32 AES_GCM importKey with "raw" format should set algorithm name > ok 33 AES_GCM importKey with "raw" format should set key as extractable > ok 34 AES_GCM importKey with "raw" format should set key usages > ok 35 AES_GCM importKey with "raw" format should have correct length key > handle > ok 36 AES_GCM importKey with "jwk" format should expect a suitable jwk format > ok 37 AES_GCM importKey with "jwk" format should expect correct kty format > ok 38 AES_GCM importKey with "jwk" format should expect data in k property > ok 39 AES_GCM importKey with "jwk" format should expect A128GCM when data > length is 16 > ok 40 AES_GCM importKey with "jwk" format should expect A192GCM when data > length is 24 > ok 41 AES_GCM importKey with "jwk" format should expect A256GCM when data > length is 32 > ok 42 AES_GCM importKey with "jwk" format should expect mismatched length > when k is not appropriate base64url > ok 43 AES_GCM importKey with "jwk" format should expect correct value when > "use" field is used > ok 44 AES_GCM importKey with "jwk" format should expect valid key operations > ok 45 AES_GCM importKey with "jwk" format should expect non extractable to > not be extractable > ok 46 AES_GCM importKey with "jwk" format should be a secret key type > ok 47 AES_GCM importKey with "jwk" format should have AES_GCM type for > algorithm > ok 48 AES_GCM importKey with "jwk" format should set algorithm name > ok 49 AES_GCM importKey with "jwk" format should set key as extractable > ok 50 AES_GCM importKey with "jwk" format should set key usages > ok 51 AES_GCM importKey with "jwk" format should have correct length key > handle > ok 52 AES_GCM exportKey should have a valid handle in the key > ok 53 AES_GCM exportKey should expect only "raw" or "jwk" formats > ok 54 AES_GCM exportKey with "raw" format should return a valid object > ok 55 AES_GCM exportKey with "jwk" format should return a valid object > ok 56 AES_GCM exportKey with "jwk" format should expect correct kty field > ok 57 AES_GCM exportKey with "jwk" format should expect A128GCM when data > length is 16 > ok 58 AES_GCM exportKey with "jwk" format should expect A192GCM when data > length is 24 > ok 59 AES_GCM exportKey with "jwk" format should expect A256GCM when data > length is 32 > # tests 57 > # pass 57 > # fail 0 > 1..59 > ok > test/algorithms/AES-KWSpec.js ................... > ok 1 AES_KW dictionaries getter should return an array # SKIP - > ok 2 AES_KW members getter should return an object # SKIP - > ok 3 AES_KW wrapKey should return an ArrayBuffer > ok 4 AES_KW wrapKey should return a valid wrapped key object > ok 5 AES_KW wrapKey should fail with invalid key length > ok 6 AES_KW unwrapKey should return an Array > ok 7 AES_KW generateKey should throw with invalid usages > ok 8 AES_KW generateKey should throw with invalid parameter length > ok 9 AES_KW generateKey should return CryptoKey > ok 10 AES_KW generateKey should be a secret key type > ok 11 AES_KW generateKey should have AES_KW type for algorithm > ok 12 AES_KW generateKey should set algorithm name > ok 13 AES_KW generateKey should set key as extractable > ok 14 AES_KW generateKey should set key usages > ok 15 AES_KW generateKey should have correct length key handle > ok 16 AES_KW generateKey should generate a random handle each time > ok 17 AES_KW importKey should throw with invalid usages > ok 18 AES_KW importKey should expect only "raw" or "jwk" formats > ok 19 AES_KW importKey with "raw" format should expect a suitable raw length > ok 20 AES_KW importKey with "raw" format should be a secret key type > ok 21 AES_KW importKey with "raw" format should have AES_KW type for algorithm > ok 22 AES_KW importKey with "raw" format should set algorithm name > ok 23 AES_KW importKey with "raw" format should set key as extractable > ok 24 AES_KW importKey with "raw" format should set key usages > ok 25 AES_KW importKey with "raw" format should have correct length key handle > ok 26 AES_KW importKey with "jwk" format should expect a suitable jwk format > ok 27 AES_KW importKey with "jwk" format should expect correct kty format > ok 28 AES_KW importKey with "jwk" format should expect data in k property > ok 29 AES_KW importKey with "jwk" format should expect A128KW when data > length is 16 > ok 30 AES_KW importKey with "jwk" format should expect A192KW when data > length is 24 > ok 31 AES_KW importKey with "jwk" format should expect A256KW when data > length is 32 > ok 32 AES_KW importKey with "jwk" format should expect mismatched length when > k is not appropriate base64url > ok 33 AES_KW importKey with "jwk" format should expect correct value when > "use" field is used > ok 34 AES_KW importKey with "jwk" format should expect valid key operations > ok 35 AES_KW importKey with "jwk" format should expect non extractable to not > be extractable > ok 36 AES_KW importKey with "jwk" format should be a secret key type > ok 37 AES_KW importKey with "jwk" format should have AES_KW type for algorithm > ok 38 AES_KW importKey with "jwk" format should set algorithm name > ok 39 AES_KW importKey with "jwk" format should set key as extractable > ok 40 AES_KW importKey with "jwk" format should set key usages > ok 41 AES_KW importKey with "jwk" format should have correct length key handle > ok 42 AES_KW exportKey should have a valid handle in the key > ok 43 AES_KW exportKey should expect only "raw" or "jwk" formats > ok 44 AES_KW exportKey with "raw" format should return a valid object > ok 45 AES_KW exportKey with "jwk" format should return a valid object > ok 46 AES_KW exportKey with "jwk" format should expect correct kty field > ok 47 AES_KW exportKey with "jwk" format should expect A128KW when data > length is 16 > ok 48 AES_KW exportKey with "jwk" format should expect A192KW when data > length is 24 > ok 49 AES_KW exportKey with "jwk" format should expect A256KW when data > length is 32 > # tests 47 > # pass 47 > # fail 0 > 1..49 > ok > > Error: Invalid type > at SupportedKeyTypes.normalize > (/usr/share/nodejs/@trust/keyto/src/types/SupportedKeyTypes.js:70:13) > at Key.get alg [as alg] > (/usr/share/nodejs/@trust/keyto/src/index.js:314:65) > at Key.parseKey (/usr/share/nodejs/@trust/keyto/src/index.js:336:11) > at new Key (/usr/share/nodejs/@trust/keyto/src/index.js:123:21) > at Function.from (/usr/share/nodejs/@trust/keyto/src/index.js:209:14) > at ECDSA.importKey (/<<PKGBUILDDIR>>/src/algorithms/ECDSA.js:301:27) > at Object.<anonymous> > (/<<PKGBUILDDIR>>/test/EcdsaKeyPairsForTesting.js:17:41) > at Module._compile (internal/modules/cjs/loader.js:999:30) > at Object.Module._extensions..js (internal/modules/cjs/loader.js:1027:10) > at Module.load (internal/modules/cjs/loader.js:863:32) > at Function.Module._load (internal/modules/cjs/loader.js:708:14) > at Module.require (internal/modules/cjs/loader.js:887:19) > at require (internal/modules/cjs/helpers.js:74:18) > at Object.<anonymous> (/<<PKGBUILDDIR>>/test/algorithms/ECDSASpec.js:44:5) > at Module._compile (internal/modules/cjs/loader.js:999:30) > at Object.Module._extensions..js (internal/modules/cjs/loader.js:1027:10) > at Module.load (internal/modules/cjs/loader.js:863:32) > at Function.Module._load (internal/modules/cjs/loader.js:708:14) > at ModuleWrap.<anonymous> (internal/modules/esm/translators.js:188:29) > at ModuleJob.run (internal/modules/esm/module_job.js:145:37) > at async Loader.import (internal/modules/esm/loader.js:182:24) > at async formattedImport > (/usr/share/nodejs/mocha/lib/nodejs/esm-utils.js:7:14) > at async Object.exports.requireOrImport > (/usr/share/nodejs/mocha/lib/nodejs/esm-utils.js:48:32) > at async Object.exports.loadFilesAsync > (/usr/share/nodejs/mocha/lib/nodejs/esm-utils.js:88:20) > at async singleRun (/usr/share/nodejs/mocha/lib/cli/run-helpers.js:125:3) > at async Object.exports.handler > (/usr/share/nodejs/mocha/lib/cli/run.js:374:5) > test/algorithms/ECDSASpec.js .................... > Dubious, test returned 1 (wstat 256, 0x100) > No subtests run > test/algorithms/EDDSASpec.js .................... > ok 1 EDDSA dictionaries getter should return an array # SKIP - > ok 2 EDDSA members getter should return an object # SKIP - > ok 3 EDDSA sign should throw with non-private key > ok 4 EDDSA sign should return an ArrayBuffer > ok 5 EDDSA sign should return an EDDSA signature > ok 6 EDDSA sign should throw with invalid data type > ok 7 EDDSA verify should throw with non-private key > ok 8 EDDSA verify should return true with valid signature > ok 9 EDDSA verify should return false with invalid signature > ok 10 EDDSA generateKey should throw with invalid usages > ok 11 EDDSA generateKey should return CryptoKey > ok 12 EDDSA generateKey should set public key type > ok 13 EDDSA generateKey should set private key type > ok 14 EDDSA generateKey should set public key algorithm > ok 15 EDDSA generateKey should set private key algorithm > ok 16 EDDSA generateKey should set public key algorithm name > ok 17 EDDSA generateKey should set private key algorithm name > ok 18 EDDSA generateKey should set public key extractable > ok 19 EDDSA generateKey should set private key extractable > ok 20 EDDSA generateKey should set public key usages > ok 21 EDDSA generateKey should set private key usages > ok 22 EDDSA importKey with "jwk" format private key and invalid usages should > throw SyntaxError > ok 23 EDDSA importKey with "jwk" format non-private key and invalid usages > should throw SyntaxError > ok 24 EDDSA importKey with "jwk" format invalid key type should throw > DataError > ok 25 EDDSA importKey with "jwk" format invalid key use should throw DataError > ok 26 EDDSA importKey with "jwk" format private Ed25519 key should define type > ok 27 EDDSA importKey with "jwk" format private Ed25519 key should define > algorithm > ok 28 EDDSA importKey with "jwk" format private Ed25519 key should define > extractable > ok 29 EDDSA importKey with "jwk" format private Ed25519 key should define > usages > ok 30 EDDSA importKey with "jwk" format public Ed25519 key should define type > ok 31 EDDSA importKey with "jwk" format public Ed25519 key should define > algorithm > ok 32 EDDSA importKey with "jwk" format public Ed25519 key should define > extractable > ok 33 EDDSA importKey with "jwk" format public Ed25519 key should define > usages > ok 34 EDDSA importKey with "hex" format private key and invalid usages should > throw SyntaxError > ok 35 EDDSA importKey with "hex" format non-private key and invalid usages > should throw SyntaxError > ok 36 EDDSA importKey with "hex" format invalid key type should throw > DataError > ok 37 EDDSA importKey with "hex" format invalid key use should throw DataError > ok 38 EDDSA importKey with "hex" format private Ed25519 key should define type > ok 39 EDDSA importKey with "hex" format private Ed25519 key should define > algorithm > ok 40 EDDSA importKey with "hex" format private Ed25519 key should define > extractable > ok 41 EDDSA importKey with "hex" format private Ed25519 key should define > usages > ok 42 EDDSA importKey with "hex" format public Ed25519 key should define type > ok 43 EDDSA importKey with "hex" format public Ed25519 key should define > algorithm > ok 44 EDDSA importKey with "hex" format public Ed25519 key should define > extractable > ok 45 EDDSA importKey with "hex" format public Ed25519 key should define > usages > ok 46 EDDSA importKey with other format should throw NotSupportedError > ok 47 EDDSA exportKey with missing key material should throw OperationError > ok 48 EDDSA exportKey with "jwk" format should return a valid key > ok 49 EDDSA exportKey with "raw" format should return a valid key > ok 50 EDDSA exportKey with "hex" format should return a valid key > ok 51 EDDSA exportKey with other format should throw NotSupportedError > # tests 49 > # pass 49 > # fail 0 > 1..51 > ok > (node:934149) [DEP0005] DeprecationWarning: Buffer() is deprecated due to > security and usability issues. Please use the Buffer.alloc(), > Buffer.allocUnsafe(), or Buffer.from() methods instead. > test/algorithms/HMACSpec.js ..................... > ok 1 HMAC dictionaries getter should return an array > ok 2 HMAC members getter should return an object > ok 3 HMAC sign should return an ArrayBuffer > ok 4 HMAC sign should return a HMAC signature > ok 5 HMAC verify should verify a valid HMAC signature > ok 6 HMAC verify should not verify an invalid HMAC signature > ok 7 HMAC generateKey should throw with invalid usages > ok 8 HMAC generateKey should throw with invalid length > ok 9 HMAC generateKey should return CryptoKey > ok 10 HMAC generateKey should set key type > ok 11 HMAC generateKey should set key algorithm > ok 12 HMAC generateKey should set key algorithm name > ok 13 HMAC generateKey should set key algorithm hash > ok 14 HMAC generateKey should set key algorithm hash name > ok 15 HMAC generateKey should set key extractable > ok 16 HMAC generateKey should set key usages > ok 17 HMAC generateKey should set key handle > ok 18 HMAC importKey should throw with invalid usages > ok 19 HMAC importKey should throw with missing algorithm hash > ok 20 HMAC importKey should throw with unsupported key format > ok 21 HMAC importKey should throw with empty key data > ok 22 HMAC importKey should import raw key data and return a CryptoKey > ok 23 HMAC importKey should set key type > ok 24 HMAC importKey should set key algorithm > ok 25 HMAC importKey should set key algorithm name > ok 26 HMAC importKey should set key algorithm hash name > ok 27 HMAC importKey should set key extractable > ok 28 HMAC importKey should set key usages > ok 29 HMAC importKey should set key handle > ok 30 HMAC exportKey should throw with invalid usages > ok 31 HMAC exportKey should throw with unsupported key format > ok 32 HMAC exportKey should return a raw key > # tests 32 > # pass 32 > # fail 0 > 1..32 > ok > (node:934156) [DEP0005] DeprecationWarning: Buffer() is deprecated due to > security and usability issues. Please use the Buffer.alloc(), > Buffer.allocUnsafe(), or Buffer.from() methods instead. > test/algorithms/RSA-OAEPspec.js ................. > ok 1 RSA_OAEP dictionaries getter should return an array # SKIP - > ok 2 RSA_OAEP members getter should return an object # SKIP - > ok 3 RSA_OAEP encrypt should throw with non-private key > ok 4 RSA_OAEP encrypt should return an ArrayBuffer > ok 5 RSA_OAEP decrypt should throw with non-private key > ok 6 RSA_OAEP decrypt should return an ArrayBuffer > ok 7 RSA_OAEP decrypt should return a valid decryption > ok 8 RSA_OAEP generateKey should throw with invalid usages # SKIP - > ok 9 RSA_OAEP generateKey should return CryptoKey # SKIP - > ok 10 RSA_OAEP generateKey should set public key type # SKIP - > ok 11 RSA_OAEP generateKey should set private key type # SKIP - > ok 12 RSA_OAEP generateKey should set public key algorithm # SKIP - > ok 13 RSA_OAEP generateKey should set private key algorithm # SKIP - > ok 14 RSA_OAEP generateKey should set public key algorithm name # SKIP - > ok 15 RSA_OAEP generateKey should set private key algorithm name # SKIP - > ok 16 RSA_OAEP generateKey should set public key algorithm hash name # SKIP - > ok 17 RSA_OAEP generateKey should set private key algorithm hash name # SKIP - > ok 18 RSA_OAEP generateKey should set public key extractable # SKIP - > ok 19 RSA_OAEP generateKey should set private key extractable # SKIP - > ok 20 RSA_OAEP generateKey should set public key usages # SKIP - > ok 21 RSA_OAEP generateKey should set private key usages # SKIP - > ok 22 RSA_OAEP generateKey should set public key handle # SKIP - > ok 23 RSA_OAEP generateKey should set private key handle # SKIP - > ok 24 RSA_OAEP importKey with "jwk" format private key and invalid usages > should throw SyntaxError > ok 25 RSA_OAEP importKey with "jwk" format non-private key and invalid usages > should throw SyntaxError > ok 26 RSA_OAEP importKey with "jwk" format invalid key type should throw > DataError > ok 27 RSA_OAEP importKey with "jwk" format invalid key use should throw > DataError > ok 28 RSA_OAEP importKey with "jwk" format RSA-OAEP key alg should set SHA-1 > hash > ok 29 RSA_OAEP importKey with "jwk" format RSA-OAEP-256 key alg should set > SHA-256 hash > ok 30 RSA_OAEP importKey with "jwk" format RSA-OAEP-384 key alg should set > SHA-384 hash > ok 31 RSA_OAEP importKey with "jwk" format RSA-OAEP-512 key alg should set > SHA-512 hash > ok 32 RSA_OAEP importKey with "jwk" format invalid key alg should throw > DataError > ok 33 RSA_OAEP importKey with "jwk" format private RSA key should define type > ok 34 RSA_OAEP importKey with "jwk" format private RSA key should define > algorithm > ok 35 RSA_OAEP importKey with "jwk" format private RSA key should define > extractable > ok 36 RSA_OAEP importKey with "jwk" format private RSA key should define > usages > ok 37 RSA_OAEP importKey with "jwk" format private RSA key should define > handle > ok 38 RSA_OAEP importKey with "jwk" format public RSA key should define type > ok 39 RSA_OAEP importKey with "jwk" format public RSA key should define > algorithm > ok 40 RSA_OAEP importKey with "jwk" format public RSA key should define > extractable > ok 41 RSA_OAEP importKey with "jwk" format public RSA key should define usages > ok 42 RSA_OAEP importKey with "jwk" format public RSA key should define handle > ok 43 RSA_OAEP importKey with other format should throw NotSupportedError > ok 44 RSA_OAEP exportKey with missing key material should throw OperationError > ok 45 RSA_OAEP exportKey with "jwk" format SHA-1 hash should set "alg" to > "RSA-OAEP" > ok 46 RSA_OAEP exportKey with "jwk" format SHA-256 hash should set "alg" to > "RSA-OAEP-256" > ok 47 RSA_OAEP exportKey with "jwk" format SHA-384 hash should set "alg" to > "RSA-OAEP-384" > ok 48 RSA_OAEP exportKey with "jwk" format SHA-512 hash should set "alg" to > "RSA-OAEP-512" > ok 49 RSA_OAEP exportKey with other format should throw NotSupportedError > # tests 31 > # pass 31 > # fail 0 > 1..49 > ok > test/algorithms/RSA-PSSSpec.js .................. > ok 1 dictionaries getter should return an array # SKIP - > ok 2 members getter should return an object # SKIP - > ok 3 sign should throw with non-private key > ok 4 sign should return an ArrayBuffer > ok 5 sign should return a correct length RSA-PSS SHA-1 signature > ok 6 sign should return a correct length RSA-PSS SHA-256 signature > ok 7 sign should return a correct length RSA-PSS SHA-384 signature > ok 8 sign should return a correct length RSA-PSS SHA-512 signature > ok 9 verify should throw with non-private key > ok 10 verify should return false with invalid signature > ok 11 verify should return true with valid SHA-1 signature > ok 12 verify should return true with valid SHA-256 signature > ok 13 verify should return true with valid SHA-384 signature > ok 14 verify should return true with valid SHA-512 signature > ok 15 generateKey should throw with invalid usages # SKIP - > ok 16 generateKey should return CryptoKey # SKIP - > ok 17 generateKey should set public key type # SKIP - > ok 18 generateKey should set private key type # SKIP - > ok 19 generateKey should set public key algorithm # SKIP - > ok 20 generateKey should set private key algorithm # SKIP - > ok 21 generateKey should set public key algorithm name # SKIP - > ok 22 generateKey should set private key algorithm name # SKIP - > ok 23 generateKey should set public key algorithm hash name # SKIP - > ok 24 generateKey should set private key algorithm hash name # SKIP - > ok 25 generateKey should set public key extractable # SKIP - > ok 26 generateKey should set private key extractable # SKIP - > ok 27 generateKey should set public key usages # SKIP - > ok 28 generateKey should set private key usages # SKIP - > ok 29 generateKey should set public key handle # SKIP - > ok 30 generateKey should set private key handle # SKIP - > ok 31 importKey with "jwk" format private key and invalid usages should throw > SyntaxError > ok 32 importKey with "jwk" format non-private key and invalid usages should > throw SyntaxError > ok 33 importKey with "jwk" format invalid key type should throw DataError > ok 34 importKey with "jwk" format invalid key use should throw DataError > ok 35 importKey with "jwk" format PS1 key alg should set SHA-1 hash > ok 36 importKey with "jwk" format PS256 key alg should set SHA-256 hash > ok 37 importKey with "jwk" format PS384 key alg should set SHA-384 hash > ok 38 importKey with "jwk" format PS512 key alg should set SHA-512 hash > ok 39 importKey with "jwk" format invalid key alg should throw DataError > ok 40 importKey with "jwk" format undefined key alg should not define hash # > SKIP - > ok 41 importKey with "jwk" format private RSA key should define type > ok 42 importKey with "jwk" format private RSA key should define algorithm > ok 43 importKey with "jwk" format private RSA key should define modulusLength > ok 44 importKey with "jwk" format private RSA key should define publicExponent > ok 45 importKey with "jwk" format private RSA key should define extractable > ok 46 importKey with "jwk" format private RSA key should define usages > ok 47 importKey with "jwk" format private RSA key should define handle > ok 48 importKey with "jwk" format public RSA key should define type > ok 49 importKey with "jwk" format public RSA key should define algorithm > ok 50 importKey with "jwk" format public RSA key should define modulusLength > ok 51 importKey with "jwk" format public RSA key should define publicExponent > ok 52 importKey with "jwk" format public RSA key should define extractable > ok 53 importKey with "jwk" format public RSA key should define usages > ok 54 importKey with "jwk" format public RSA key should define handle > ok 55 importKey with other format should throw NotSupportedError > ok 56 exportKey with missing key material should throw OperationError > ok 57 exportKey with "jwk" format SHA-1 hash should set "alg" to "PS1" > ok 58 exportKey with "jwk" format SHA-256 hash should set "alg" to "PS256" > ok 59 exportKey with "jwk" format SHA-384 hash should set "alg" to "PS384" > ok 60 exportKey with "jwk" format SHA-512 hash should set "alg" to "PS512" > ok 61 exportKey with other format should throw NotSupportedError > # tests 42 > # pass 42 > # fail 0 > 1..61 > ok > test/algorithms/RSASSA-PKCS1-v1_5_Spec.js ....... > ok 1 dictionaries getter should return an array # SKIP - > ok 2 members getter should return an object # SKIP - > ok 3 sign should throw with non-private key > ok 4 sign should return an ArrayBuffer > ok 5 sign should return a RSASSA-PKCS1-v1_5 SHA-1 signature > ok 6 sign should return a RSASSA-PKCS1-v1_5 SHA-256 signature > ok 7 sign should return a RSASSA-PKCS1-v1_5 SHA-384 signature > ok 8 sign should return a RSASSA-PKCS1-v1_5 SHA-512 signature > ok 9 verify should throw with non-private key > ok 10 verify should return false with invalid signature > ok 11 verify should return true with valid SHA-1 signature > ok 12 verify should return true with valid SHA-256 signature > ok 13 verify should return true with valid SHA-384 signature > ok 14 verify should return true with valid SHA-512 signature > ok 15 generateKey should throw with invalid usages # SKIP - > ok 16 generateKey should return CryptoKey # SKIP - > ok 17 generateKey should set public key type # SKIP - > ok 18 generateKey should set private key type # SKIP - > ok 19 generateKey should set public key algorithm # SKIP - > ok 20 generateKey should set private key algorithm # SKIP - > ok 21 generateKey should set public key algorithm name # SKIP - > ok 22 generateKey should set private key algorithm name # SKIP - > ok 23 generateKey should set public key algorithm hash name # SKIP - > ok 24 generateKey should set private key algorithm hash name # SKIP - > ok 25 generateKey should set public key extractable # SKIP - > ok 26 generateKey should set private key extractable # SKIP - > ok 27 generateKey should set public key usages # SKIP - > ok 28 generateKey should set private key usages # SKIP - > ok 29 generateKey should set public key handle # SKIP - > ok 30 generateKey should set private key handle # SKIP - > ok 31 importKey with "jwk" format private key and invalid usages should throw > SyntaxError > ok 32 importKey with "jwk" format non-private key and invalid usages should > throw SyntaxError > ok 33 importKey with "jwk" format invalid key type should throw DataError > ok 34 importKey with "jwk" format invalid key use should throw DataError > ok 35 importKey with "jwk" format RS1 key alg should set SHA-1 hash > ok 36 importKey with "jwk" format RS256 key alg should set SHA-256 hash > ok 37 importKey with "jwk" format RS384 key alg should set SHA-384 hash > ok 38 importKey with "jwk" format RS512 key alg should set SHA-512 hash > ok 39 importKey with "jwk" format invalid key alg should throw DataError > ok 40 importKey with "jwk" format undefined key alg should not define hash # > SKIP - > ok 41 importKey with "jwk" format private RSA key should define type > ok 42 importKey with "jwk" format private RSA key should define algorithm > ok 43 importKey with "jwk" format private RSA key should define modulusLength > ok 44 importKey with "jwk" format private RSA key should define publicExponent > ok 45 importKey with "jwk" format private RSA key should define extractable > ok 46 importKey with "jwk" format private RSA key should define usages > ok 47 importKey with "jwk" format private RSA key should define handle > ok 48 importKey with "jwk" format public RSA key should define type > ok 49 importKey with "jwk" format public RSA key should define algorithm > ok 50 importKey with "jwk" format public RSA key should define modulusLength > ok 51 importKey with "jwk" format public RSA key should define publicExponent > ok 52 importKey with "jwk" format public RSA key should define extractable > ok 53 importKey with "jwk" format public RSA key should define usages > ok 54 importKey with "jwk" format public RSA key should define handle > ok 55 importKey with other format should throw NotSupportedError > ok 56 exportKey with missing key material should throw OperationError > ok 57 exportKey with "jwk" format SHA-1 hash should set "alg" to "RS1" > ok 58 exportKey with "jwk" format SHA-256 hash should set "alg" to "RS256" > ok 59 exportKey with "jwk" format SHA-384 hash should set "alg" to "RS384" > ok 60 exportKey with "jwk" format SHA-512 hash should set "alg" to "RS512" > ok 61 exportKey with other format should throw NotSupportedError > # tests 42 > # pass 42 > # fail 0 > 1..61 > ok > test/algorithms/RegisteredAlgorithmsSpec.js ..... > ok 1 RegisteredAlgorithms constructor should assign object argument properties > ok 2 RegisteredAlgorithms getCaseInsensitive should match a known property > with exact case > ok 3 RegisteredAlgorithms getCaseInsensitive should match a known property > with different case > ok 4 RegisteredAlgorithms getCaseInsensitive should return "undefined" with > no match > # tests 4 > # pass 4 > # fail 0 > 1..4 > ok > test/algorithms/SHASpec.js ...................... > ok 1 SHA dictionaries getter should return an array > ok 2 SHA members getter should return an object > ok 3 SHA digest should return an ArrayBuffer > ok 4 SHA digest should return a SHA-1 digest > ok 5 SHA digest should return a SHA-256 digest > ok 6 SHA digest should return a SHA-384 digest > ok 7 SHA digest should return a SHA-512 digest > ok 8 SHA digest should throw an OperationError with unknown algorithm > # tests 8 > # pass 8 > # fail 0 > 1..8 > ok > test/algorithms/SupportedAlgorithmsSpec.js ...... > ok 1 SupportedAlgorithms constructor should initialize a container for each > operation > ok 2 SupportedAlgorithms operations should include specified operations > ok 3 SupportedAlgorithms define should registered a type for an operation of > an algorithm > ok 4 SupportedAlgorithms normalize with string "alg" argument unknown > algorithm should return an error > ok 5 SupportedAlgorithms normalize with string "alg" argument valid algorithm > should return the normalized algorithm > ok 6 SupportedAlgorithms normalize with object "alg" argument invalid "name" > should return an error > ok 7 SupportedAlgorithms normalize with object "alg" argument unknown > algorithm should return a NotSupportedError > ok 8 SupportedAlgorithms normalize with object "alg" argument invalid param > should return an error # SKIP - > ok 9 SupportedAlgorithms normalize with object "alg" argument valid params > should return the normalized algorithm > # tests 8 > # pass 8 > # fail 0 > 1..9 > ok > test/dictionaries/AlgorithmSpec.js .............. > ok 1 Algorithm constructor with string "algorithm" argument should set > instance name to argument value > ok 2 Algorithm constructor with object "algorithm" argument should assign > argument property values to instance > ok 3 Algorithm constructor with object "algorithm" argument should require > algorithm name to be a string > # tests 3 > # pass 3 > # fail 0 > 1..3 > ok > test/dictionaries/HmacKeyAlgorithmSpec.js ....... skipped: (no reason given) > test/dictionaries/KeyAlgorithmSpec.js ........... > ok 1 KeyAlgorithm constructor should assign argument property values to > instance > ok 2 KeyAlgorithm constructor should require algorithm name > # tests 2 > # pass 2 > # fail 0 > 1..2 > ok > test/dictionaries/RsaHashedKeyAlgorithmSpec.js .. skipped: (no reason given) > test/dictionaries/ShaKeyAlgorithmSpec.js ........ skipped: (no reason given) > test/keys/CryptoKeyPairSpec.js .................. skipped: (no reason given) > test/keys/CryptoKeySpec.js ...................... skipped: (no reason given) > test/keys/JsonWebKeySpec.js ..................... skipped: (no reason given) > test/keys/recognizedKeyUsagesSpec.js ............ > ok 1 recognizedKeyUsages constructor should initialize the list > ok 2 recognizedKeyUsages normalize should include recognized usages > ok 3 recognizedKeyUsages normalize should ignore unknown usages > # tests 3 > # pass 3 > # fail 0 > 1..3 > ok > > Test Summary Report > ------------------- > test/EcdsaKeyPairsForTesting.js (Wstat: 256 Tests: 0 Failed: 0) > Non-zero exit status: 1 > Parse errors: No plan found in TAP output > test/algorithms/ECDSASpec.js (Wstat: 256 Tests: 0 Failed: 0) > Non-zero exit status: 1 > Parse errors: No plan found in TAP output > Files=27, Tests=584, 8 wallclock secs ( 0.09 usr 0.02 sys + 7.89 cusr > 0.76 csys = 8.76 CPU) > Result: FAIL > make[1]: *** [debian/rules:18: override_dh_auto_test] Error 1 The full build log is available from: http://qa-logs.debian.net/2021/12/20/node-trust-webcrypto_0.9.2-1_unstable.log A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! If you reassign this bug to another package, please marking it as 'affects'-ing this package. See https://www.debian.org/Bugs/server-control#affects If you fail to reproduce this, please provide a build log and diff it with mine so that we can identify if something relevant changed in the meantime.