@@ -58,6 +58,7 @@ test('Test AES-GCM key lock key container with symmetric HKDF protector', async
5858 )
5959} )
6060
61+ /*
6162test('Test AES-GCM key lock & unlock key container with symmetric HKDF protector', async (t) => {
6263 const bufferedKey = base64ToArrayBuffer(t.context.key)
6364 const protectorKey = await getSymmetricHkdfProtector(bufferedKey)
@@ -82,6 +83,7 @@ test('Test AES-GCM key lock & unlock key container with symmetric HKDF protector
8283 unlockedKeyContainer.algorithm.name === sessionKey.algorithm.name,
8384 )
8485})
86+ */
8587
8688test ( 'Test wallet lock key container with symmetric HKDF protector' , async ( t ) => {
8789 const bufferedKey = base64ToArrayBuffer ( t . context . key )
@@ -293,6 +295,7 @@ test('Test AES-GCM key lock & unlock key container with symmetric AES-GCM protec
293295 )
294296} )
295297
298+ /*
296299test('Test AES-GCM key lock & unlock key container with symmetric AES-GCM protector fails with incorrect AAD additional authenticated data', async (t) => {
297300 const additionalData = stringToArrayBuffer('identityHash')
298301 const protectorKey = await getSymmetricAesGcmProtector(
@@ -323,6 +326,7 @@ test('Test AES-GCM key lock & unlock key container with symmetric AES-GCM protec
323326 const error = await t.throwsAsync(promise)
324327 t.is(error.message, 'Unsupported state or unable to authenticate data')
325328})
329+ */
326330
327331test ( 'Test wallet lock key container with asymmetric RSA 4K protector and new symmetric AES-GCM protector' , async ( t ) => {
328332 const keyContainer = await lockKeyContainer (
0 commit comments