Completely failed files: 54; Completely failed subtests: 746; Failure level: 746/10576 (7.05%)
| Test | Ch73 |
|---|---|
| /WebCryptoAPI/encrypt_decrypt/test_aes_ctr.https.html (11/33, 33.33%, 0.10% of total) | OK |
| importKey step for decryption: AES-CTR 192-bit key | FAIL |
| importKey step for decryption: AES-CTR 192-bit key with altered ciphertext | FAIL |
| importKey step: AES-CTR 192-bit key | FAIL |
| importKey step: AES-CTR 192-bit key with altered plaintext | FAIL |
| importKey step: AES-CTR 192-bit key with mismatched key and algorithm | FAIL |
| importKey step: AES-CTR 192-bit key without decrypt usage | FAIL |
| importKey step: AES-CTR 192-bit key without encrypt usage | FAIL |
| importKey step: AES-CTR 192-bit key, 0-bit counter | FAIL |
| importKey step: AES-CTR 192-bit key, 129-bit counter | FAIL |
| importKey step: decryption AES-CTR 192-bit key, 0-bit counter | FAIL |
| importKey step: decryption AES-CTR 192-bit key, 129-bit counter | FAIL |
| /WebCryptoAPI/encrypt_decrypt/test_aes_gcm.https.html (114/330, 34.55%, 1.08% of total) | OK |
| AES-GCM 128-bit key, illegal tag length 256-bits | FAIL |
| AES-GCM 128-bit key, illegal tag length 256-bits decryption | FAIL |
| AES-GCM 256-bit key, illegal tag length 256-bits | FAIL |
| AES-GCM 256-bit key, illegal tag length 256-bits decryption | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 104-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 104-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 112-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 112-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 120-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 120-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 128-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 128-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 32-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 32-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 64-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 64-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 96-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 96-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 104-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 104-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 112-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 112-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 120-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 120-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 128-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 128-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 32-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 32-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 64-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 64-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 96-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 96-bit tag with altered ciphertext | FAIL |
| importKey step: AES-GCM 192-bit key, 104-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, 104-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, 104-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, 104-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 104-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 112-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, 112-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, 112-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, 112-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 112-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 120-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, 120-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, 120-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, 120-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 120-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 128-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, 128-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, 128-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, 128-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 128-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 32-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, 32-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, 32-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, 32-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 32-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 64-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, 64-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, 64-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, 64-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 64-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 96-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, 96-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, 96-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, 96-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 96-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, illegal tag length 129-bits | FAIL |
| importKey step: AES-GCM 192-bit key, illegal tag length 24-bits | FAIL |
| importKey step: AES-GCM 192-bit key, illegal tag length 256-bits | FAIL |
| importKey step: AES-GCM 192-bit key, illegal tag length 48-bits | FAIL |
| importKey step: AES-GCM 192-bit key, illegal tag length 72-bits | FAIL |
| importKey step: AES-GCM 192-bit key, illegal tag length 95-bits | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 104-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 104-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 104-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 104-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 104-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 112-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 112-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 112-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 112-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 112-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 120-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 120-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 120-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 120-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 120-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 128-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 128-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 128-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 128-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 128-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 32-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 32-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 32-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 32-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 32-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 64-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 64-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 64-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 64-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 64-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 96-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 96-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 96-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 96-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 96-bit tag without encrypt usage | FAIL |
| importKey step: decryption AES-GCM 192-bit key, illegal tag length 129-bits | FAIL |
| importKey step: decryption AES-GCM 192-bit key, illegal tag length 24-bits | FAIL |
| importKey step: decryption AES-GCM 192-bit key, illegal tag length 256-bits | FAIL |
| importKey step: decryption AES-GCM 192-bit key, illegal tag length 48-bits | FAIL |
| importKey step: decryption AES-GCM 192-bit key, illegal tag length 72-bits | FAIL |
| importKey step: decryption AES-GCM 192-bit key, illegal tag length 95-bits | FAIL |
| /WebCryptoAPI/generateKey/successes_AES-CTR.https.any.html (96/288, 33.33%, 0.91% of total) | OK |
| Success: generateKey({length: 192, name: AES-CTR}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [wrapKey]) | FAIL |
| /WebCryptoAPI/generateKey/successes_AES-KW.https.any.html (24/72, 33.33%, 0.23% of total) | OK |
| Success: generateKey({length: 192, name: AES-KW}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-KW}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-KW}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-KW}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-KW}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-kw}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-kw}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-kw}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-kw}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-kw}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-kw}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-kw}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-kw}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-kw}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-kw}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-kw}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-kw}, true, [wrapKey]) | FAIL |
| /WebCryptoAPI/generateKey/successes_AES-CBC.https.any.html (96/288, 33.33%, 0.91% of total) | OK |
| Success: generateKey({length: 192, name: AES-CBC}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey]) | FAIL |
| /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?1-1000 (1/1, 100.00%, 0.01% of total) | TIMEOUT |
| undefined | TIMEOUT |
| /WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.html?1-10 (1/1, 100.00%, 0.01% of total) | TIMEOUT |
| undefined | TIMEOUT |
| /WebCryptoAPI/encrypt_decrypt/aes_ctr.https.worker.html (11/33, 33.33%, 0.10% of total) | OK |
| importKey step for decryption: AES-CTR 192-bit key | FAIL |
| importKey step for decryption: AES-CTR 192-bit key with altered ciphertext | FAIL |
| importKey step: AES-CTR 192-bit key | FAIL |
| importKey step: AES-CTR 192-bit key with altered plaintext | FAIL |
| importKey step: AES-CTR 192-bit key with mismatched key and algorithm | FAIL |
| importKey step: AES-CTR 192-bit key without decrypt usage | FAIL |
| importKey step: AES-CTR 192-bit key without encrypt usage | FAIL |
| importKey step: AES-CTR 192-bit key, 0-bit counter | FAIL |
| importKey step: AES-CTR 192-bit key, 129-bit counter | FAIL |
| importKey step: decryption AES-CTR 192-bit key, 0-bit counter | FAIL |
| importKey step: decryption AES-CTR 192-bit key, 129-bit counter | FAIL |
| /WebCryptoAPI/import_export/test_symmetric_importKey.https.html (48/234, 20.51%, 0.45% of total) | OK |
| Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [wrapKey]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [wrapKey]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey]) | FAIL |
| /WebCryptoAPI/generateKey/successes_AES-GCM.https.any.html (96/288, 33.33%, 0.91% of total) | OK |
| Success: generateKey({length: 192, name: AES-GCM}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [wrapKey]) | FAIL |
| /WebCryptoAPI/generateKey/failures_AES-GCM.https.any.html (2/738, 0.27%, 0.02% of total) | OK |
| Empty usages: generateKey({length: 192, name: AES-GCM}, false, []) | FAIL |
| Empty usages: generateKey({length: 192, name: AES-GCM}, true, []) | FAIL |
| /WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.html?1-10 (1/1, 100.00%, 0.01% of total) | TIMEOUT |
| undefined | TIMEOUT |
| /WebCryptoAPI/wrapKey_unwrapKey/test_wrapKey_unwrapKey.https.html (22/270, 8.15%, 0.21% of total) | OK |
| Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-CBC keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-CTR keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-GCM keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-GCM keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-KW keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap ECDH private key keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap ECDH public key keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap ECDSA private key keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap ECDSA public key keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap HMAC keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap HMAC keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap RSA-OAEP private key keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap RSA-PSS private key keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap RSA-PSS private key keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-KW | FAIL |
| /WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.worker.html (22/270, 8.15%, 0.21% of total) | OK |
| Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-CBC keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-CTR keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-GCM keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-GCM keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-KW keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap ECDH private key keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap ECDH public key keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap ECDSA private key keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap ECDSA public key keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap HMAC keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap HMAC keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap RSA-OAEP private key keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap RSA-PSS private key keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap RSA-PSS private key keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-KW | FAIL |
| /WebCryptoAPI/encrypt_decrypt/aes_cbc.https.worker.html (14/42, 33.33%, 0.13% of total) | OK |
| importKey step for decryption: AES-CBC 192-bit key | FAIL |
| importKey step for decryption: AES-CBC 192-bit key with altered ciphertext | FAIL |
| importKey step: AES-CBC 192-bit key | FAIL |
| importKey step: AES-CBC 192-bit key with altered plaintext | FAIL |
| importKey step: AES-CBC 192-bit key with mismatched key and algorithm | FAIL |
| importKey step: AES-CBC 192-bit key without decrypt usage | FAIL |
| importKey step: AES-CBC 192-bit key without encrypt usage | FAIL |
| importKey step: AES-CBC 192-bit key, 192-bit IV | FAIL |
| importKey step: AES-CBC 192-bit key, 64-bit IV | FAIL |
| importKey step: decryption AES-CBC 192-bit key, 192-bit IV | FAIL |
| importKey step: decryption AES-CBC 192-bit key, 64-bit IV | FAIL |
| importKey step: decryption AES-CBC 192-bit key, bigPadChar | FAIL |
| importKey step: decryption AES-CBC 192-bit key, inconsistentPadChars | FAIL |
| importKey step: decryption AES-CBC 192-bit key, zeroPadChar | FAIL |
| /WebCryptoAPI/generateKey/failures_AES-CBC.https.any.html (2/738, 0.27%, 0.02% of total) | OK |
| Empty usages: generateKey({length: 192, name: AES-CBC}, false, []) | FAIL |
| Empty usages: generateKey({length: 192, name: AES-CBC}, true, []) | FAIL |
| /WebCryptoAPI/import_export/symmetric_importKey.https.worker.html (48/234, 20.51%, 0.45% of total) | OK |
| Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [wrapKey]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [wrapKey]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey]) | FAIL |
| /WebCryptoAPI/derive_bits_keys/hkdf.https.any.html?1-1000 (1/1, 100.00%, 0.01% of total) | TIMEOUT |
| undefined | TIMEOUT |
| /WebCryptoAPI/generateKey/failures_AES-CTR.https.any.html (2/738, 0.27%, 0.02% of total) | OK |
| Empty usages: generateKey({length: 192, name: AES-CTR}, false, []) | FAIL |
| Empty usages: generateKey({length: 192, name: AES-CTR}, true, []) | FAIL |
| /WebCryptoAPI/encrypt_decrypt/test_aes_cbc.https.html (14/42, 33.33%, 0.13% of total) | OK |
| importKey step for decryption: AES-CBC 192-bit key | FAIL |
| importKey step for decryption: AES-CBC 192-bit key with altered ciphertext | FAIL |
| importKey step: AES-CBC 192-bit key | FAIL |
| importKey step: AES-CBC 192-bit key with altered plaintext | FAIL |
| importKey step: AES-CBC 192-bit key with mismatched key and algorithm | FAIL |
| importKey step: AES-CBC 192-bit key without decrypt usage | FAIL |
| importKey step: AES-CBC 192-bit key without encrypt usage | FAIL |
| importKey step: AES-CBC 192-bit key, 192-bit IV | FAIL |
| importKey step: AES-CBC 192-bit key, 64-bit IV | FAIL |
| importKey step: decryption AES-CBC 192-bit key, 192-bit IV | FAIL |
| importKey step: decryption AES-CBC 192-bit key, 64-bit IV | FAIL |
| importKey step: decryption AES-CBC 192-bit key, bigPadChar | FAIL |
| importKey step: decryption AES-CBC 192-bit key, inconsistentPadChars | FAIL |
| importKey step: decryption AES-CBC 192-bit key, zeroPadChar | FAIL |
| /WebCryptoAPI/derive_bits_keys/ecdh_bits.https.any.html (3/42, 7.14%, 0.03% of total) | OK |
| P-256 with null length | FAIL |
| P-384 with null length | FAIL |
| P-521 with null length | FAIL |
| /WebCryptoAPI/encrypt_decrypt/aes_gcm.https.worker.html (114/330, 34.55%, 1.08% of total) | OK |
| AES-GCM 128-bit key, illegal tag length 256-bits | FAIL |
| AES-GCM 128-bit key, illegal tag length 256-bits decryption | FAIL |
| AES-GCM 256-bit key, illegal tag length 256-bits | FAIL |
| AES-GCM 256-bit key, illegal tag length 256-bits decryption | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 104-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 104-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 112-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 112-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 120-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 120-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 128-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 128-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 32-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 32-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 64-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 64-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 96-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, 96-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 104-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 104-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 112-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 112-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 120-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 120-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 128-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 128-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 32-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 32-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 64-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 64-bit tag with altered ciphertext | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 96-bit tag | FAIL |
| importKey step for decryption: AES-GCM 192-bit key, no additional data, 96-bit tag with altered ciphertext | FAIL |
| importKey step: AES-GCM 192-bit key, 104-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, 104-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, 104-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, 104-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 104-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 112-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, 112-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, 112-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, 112-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 112-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 120-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, 120-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, 120-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, 120-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 120-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 128-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, 128-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, 128-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, 128-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 128-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 32-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, 32-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, 32-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, 32-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 32-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 64-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, 64-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, 64-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, 64-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 64-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 96-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, 96-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, 96-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, 96-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, 96-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, illegal tag length 129-bits | FAIL |
| importKey step: AES-GCM 192-bit key, illegal tag length 24-bits | FAIL |
| importKey step: AES-GCM 192-bit key, illegal tag length 256-bits | FAIL |
| importKey step: AES-GCM 192-bit key, illegal tag length 48-bits | FAIL |
| importKey step: AES-GCM 192-bit key, illegal tag length 72-bits | FAIL |
| importKey step: AES-GCM 192-bit key, illegal tag length 95-bits | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 104-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 104-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 104-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 104-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 104-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 112-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 112-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 112-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 112-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 112-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 120-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 120-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 120-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 120-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 120-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 128-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 128-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 128-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 128-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 128-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 32-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 32-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 32-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 32-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 32-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 64-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 64-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 64-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 64-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 64-bit tag without encrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 96-bit tag | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 96-bit tag with altered plaintext | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 96-bit tag with mismatched key and algorithm | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 96-bit tag without decrypt usage | FAIL |
| importKey step: AES-GCM 192-bit key, no additional data, 96-bit tag without encrypt usage | FAIL |
| importKey step: decryption AES-GCM 192-bit key, illegal tag length 129-bits | FAIL |
| importKey step: decryption AES-GCM 192-bit key, illegal tag length 24-bits | FAIL |
| importKey step: decryption AES-GCM 192-bit key, illegal tag length 256-bits | FAIL |
| importKey step: decryption AES-GCM 192-bit key, illegal tag length 48-bits | FAIL |
| importKey step: decryption AES-GCM 192-bit key, illegal tag length 72-bits | FAIL |
| importKey step: decryption AES-GCM 192-bit key, illegal tag length 95-bits | FAIL |
| /WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.html?1-10 (1/1, 100.00%, 0.01% of total) | TIMEOUT |
| undefined | TIMEOUT |
| /WebCryptoAPI/generateKey/failures_AES-KW.https.any.html (2/480, 0.42%, 0.02% of total) | OK |
| Empty usages: generateKey({length: 192, name: AES-KW}, false, []) | FAIL |
| Empty usages: generateKey({length: 192, name: AES-KW}, true, []) | FAIL |