Completely failed files: 54; Completely failed subtests: 307; Failure level: 307/10506 (2.92%)
| Test | Sf12 |
|---|---|
| /WebCryptoAPI/sign_verify/ecdsa.https.worker.html (56/168, 33.33%, 0.53% of total) | OK |
| importVectorKeys step: ECDSA P-521 with SHA-1 no verify usage | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 round trip | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 signing with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 using privateKey to verify | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 using publicKey to sign | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 verification | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered plaintext | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered signature | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to bad hash name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to shortened signature | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to wrong hash | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 verification with altered signature after call | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 verifying with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 with altered plaintext after call | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 no verify usage | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 round trip | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 signing with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 using privateKey to verify | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 using publicKey to sign | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 verification | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered plaintext | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered signature | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to bad hash name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to shortened signature | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to wrong hash | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 verification with altered signature after call | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 verifying with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 with altered plaintext after call | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 no verify usage | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 round trip | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 signing with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 using privateKey to verify | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 using publicKey to sign | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 verification | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered plaintext | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered signature | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to bad hash name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to shortened signature | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to wrong hash | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 verification with altered signature after call | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 verifying with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 with altered plaintext after call | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 no verify usage | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 round trip | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 signing with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 using privateKey to verify | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 using publicKey to sign | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 verification | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered plaintext | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered signature | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to bad hash name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to shortened signature | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to wrong hash | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 verification with altered signature after call | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 verifying with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 with altered plaintext after call | FAIL |
| /WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.worker.html (31/270, 11.48%, 0.30% of total) | OK |
| Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-CBC keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-CTR keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-GCM keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-GCM keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-KW keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap ECDH private key keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap ECDH public key keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap ECDSA private key keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap ECDSA public key keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap HMAC keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap HMAC keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap RSA-OAEP private key keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-CBC | FAIL |
| Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-CTR | FAIL |
| Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-GCM | FAIL |
| Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap RSA-PSS private key keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap RSA-PSS private key keys using jwk and AES-CBC | FAIL |
| Can wrap and unwrap RSA-PSS private key keys using jwk and AES-CTR | FAIL |
| Can wrap and unwrap RSA-PSS private key keys using jwk and AES-GCM | FAIL |
| Can wrap and unwrap RSA-PSS private key keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-CBC | FAIL |
| Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-CTR | FAIL |
| Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-GCM | FAIL |
| Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-KW | FAIL |
| /WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.html?1-10 (1/1, 100.00%, 0.01% of total) | TIMEOUT |
| undefined | TIMEOUT |
| /WebCryptoAPI/derive_bits_keys/hkdf.https.any.html?1-1000 (1/1, 100.00%, 0.01% of total) | TIMEOUT |
| undefined | TIMEOUT |
| /WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.html?1-10 (1/1, 100.00%, 0.01% of total) | TIMEOUT |
| undefined | TIMEOUT |
| /WebCryptoAPI/derive_bits_keys/ecdh_keys.https.any.html (1/1, 100.00%, 0.01% of total) | OK |
| WebCryptoAPI: deriveKey() Using ECDH | FAIL |
| /WebCryptoAPI/secure_context/crypto-subtle-non-secure-context-not-available.sub.html (2/2, 100.00%, 0.02% of total) | OK |
| Non-secure context window does not have access to crypto.subtle | FAIL |
| Non-secure context worker does not have access to crypto.subtle | FAIL |
| /WebCryptoAPI/encrypt_decrypt/test_aes_gcm.https.html (6/330, 1.82%, 0.06% of total) | OK |
| AES-GCM 128-bit key, illegal tag length 256-bits | FAIL |
| AES-GCM 128-bit key, illegal tag length 256-bits decryption | FAIL |
| AES-GCM 192-bit key, illegal tag length 256-bits | FAIL |
| AES-GCM 192-bit key, illegal tag length 256-bits decryption | FAIL |
| AES-GCM 256-bit key, illegal tag length 256-bits | FAIL |
| AES-GCM 256-bit key, illegal tag length 256-bits decryption | FAIL |
| /WebCryptoAPI/import_export/ec_importKey.https.worker.html (24/72, 33.33%, 0.23% of total) | OK |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-521}, false, []) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-521}, true, []) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-521}, false, []) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-521}, true, []) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey]) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveBits]) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveKey]) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey]) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveBits]) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveKey]) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, false, [sign]) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, true, [sign]) | FAIL |
| Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey]) | FAIL |
| Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits]) | FAIL |
| Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveKey]) | FAIL |
| Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey]) | FAIL |
| Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits]) | FAIL |
| Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveKey]) | FAIL |
| Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, false, [sign]) | FAIL |
| Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, true, [sign]) | FAIL |
| Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, false, []) | FAIL |
| Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, true, []) | FAIL |
| Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, false, []) | FAIL |
| Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, true, []) | FAIL |
| /WebCryptoAPI/sign_verify/test_ecdsa.https.html (56/168, 33.33%, 0.53% of total) | OK |
| importVectorKeys step: ECDSA P-521 with SHA-1 no verify usage | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 round trip | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 signing with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 using privateKey to verify | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 using publicKey to sign | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 verification | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered plaintext | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered signature | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to bad hash name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to shortened signature | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to wrong hash | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 verification with altered signature after call | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 verifying with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 with altered plaintext after call | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 no verify usage | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 round trip | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 signing with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 using privateKey to verify | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 using publicKey to sign | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 verification | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered plaintext | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered signature | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to bad hash name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to shortened signature | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to wrong hash | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 verification with altered signature after call | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 verifying with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 with altered plaintext after call | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 no verify usage | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 round trip | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 signing with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 using privateKey to verify | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 using publicKey to sign | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 verification | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered plaintext | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered signature | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to bad hash name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to shortened signature | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to wrong hash | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 verification with altered signature after call | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 verifying with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 with altered plaintext after call | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 no verify usage | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 round trip | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 signing with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 using privateKey to verify | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 using publicKey to sign | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 verification | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered plaintext | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered signature | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to bad hash name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to shortened signature | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to wrong hash | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 verification with altered signature after call | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 verifying with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 with altered plaintext after call | FAIL |
| /WebCryptoAPI/generateKey/failures_ECDSA.https.any.html (2/418, 0.48%, 0.02% of total) | OK |
| Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, false, []) | FAIL |
| Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, true, []) | FAIL |
| /WebCryptoAPI/derive_bits_keys/ecdh_bits.https.any.html (1/1, 100.00%, 0.01% of total) | OK |
| WebCryptoAPI: deriveBits() Using ECDH | FAIL |
| /WebCryptoAPI/generateKey/failures_ECDH.https.any.html (2/440, 0.45%, 0.02% of total) | OK |
| Empty usages: generateKey({name: ECDH, namedCurve: P-521}, false, []) | FAIL |
| Empty usages: generateKey({name: ECDH, namedCurve: P-521}, true, []) | FAIL |
| /WebCryptoAPI/wrapKey_unwrapKey/test_wrapKey_unwrapKey.https.html (31/270, 11.48%, 0.30% of total) | OK |
| Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-CBC keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-CTR keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-GCM keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-GCM keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap AES-KW keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap ECDH private key keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap ECDH public key keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap ECDSA private key keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap ECDSA public key keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap HMAC keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap HMAC keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap RSA-OAEP private key keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-CBC | FAIL |
| Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-CTR | FAIL |
| Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-GCM | FAIL |
| Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap RSA-PSS private key keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap RSA-PSS private key keys using jwk and AES-CBC | FAIL |
| Can wrap and unwrap RSA-PSS private key keys using jwk and AES-CTR | FAIL |
| Can wrap and unwrap RSA-PSS private key keys using jwk and AES-GCM | FAIL |
| Can wrap and unwrap RSA-PSS private key keys using jwk and AES-KW | FAIL |
| Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using jwk and AES-KW | FAIL |
| Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-CBC | FAIL |
| Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-CTR | FAIL |
| Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-GCM | FAIL |
| Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-KW | FAIL |
| /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?1-1000 (1/1, 100.00%, 0.01% of total) | TIMEOUT |
| undefined | TIMEOUT |
| /WebCryptoAPI/generateKey/successes_ECDSA.https.any.html (18/54, 33.33%, 0.17% of total) | OK |
| Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign, verify, sign, sign, verify]) | FAIL |
| Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign]) | FAIL |
| Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [verify, sign]) | FAIL |
| Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify]) | FAIL |
| Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign]) | FAIL |
| Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign]) | FAIL |
| Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify]) | FAIL |
| Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign]) | FAIL |
| Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [verify, sign]) | FAIL |
| Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify]) | FAIL |
| Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign]) | FAIL |
| Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [verify, sign]) | FAIL |
| Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify]) | FAIL |
| Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign]) | FAIL |
| Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [verify, sign]) | FAIL |
| Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify]) | FAIL |
| Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign]) | FAIL |
| Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [verify, sign]) | FAIL |
| /WebCryptoAPI/import_export/test_ec_importKey.https.html (24/72, 33.33%, 0.23% of total) | OK |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-521}, false, []) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-521}, true, []) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-521}, false, []) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-521}, true, []) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey]) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveBits]) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveKey]) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey]) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveBits]) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveKey]) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, false, [sign]) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, true, [sign]) | FAIL |
| Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey]) | FAIL |
| Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits]) | FAIL |
| Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveKey]) | FAIL |
| Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey]) | FAIL |
| Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits]) | FAIL |
| Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveKey]) | FAIL |
| Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, false, [sign]) | FAIL |
| Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, true, [sign]) | FAIL |
| Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, false, []) | FAIL |
| Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, true, []) | FAIL |
| Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, false, []) | FAIL |
| Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, true, []) | FAIL |
| /WebCryptoAPI/generateKey/successes_ECDH.https.any.html (24/72, 33.33%, 0.23% of total) | OK |
| Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey]) | FAIL |
| /WebCryptoAPI/encrypt_decrypt/aes_cbc.https.worker.html (9/42, 21.43%, 0.09% of total) | OK |
| AES-CBC 128-bit key, bigPadChar | FAIL |
| AES-CBC 128-bit key, inconsistentPadChars | FAIL |
| AES-CBC 128-bit key, zeroPadChar | FAIL |
| AES-CBC 192-bit key, bigPadChar | FAIL |
| AES-CBC 192-bit key, inconsistentPadChars | FAIL |
| AES-CBC 192-bit key, zeroPadChar | FAIL |
| AES-CBC 256-bit key, bigPadChar | FAIL |
| AES-CBC 256-bit key, inconsistentPadChars | FAIL |
| AES-CBC 256-bit key, zeroPadChar | FAIL |
| /WebCryptoAPI/encrypt_decrypt/test_aes_cbc.https.html (9/42, 21.43%, 0.09% of total) | OK |
| AES-CBC 128-bit key, bigPadChar | FAIL |
| AES-CBC 128-bit key, inconsistentPadChars | FAIL |
| AES-CBC 128-bit key, zeroPadChar | FAIL |
| AES-CBC 192-bit key, bigPadChar | FAIL |
| AES-CBC 192-bit key, inconsistentPadChars | FAIL |
| AES-CBC 192-bit key, zeroPadChar | FAIL |
| AES-CBC 256-bit key, bigPadChar | FAIL |
| AES-CBC 256-bit key, inconsistentPadChars | FAIL |
| AES-CBC 256-bit key, zeroPadChar | FAIL |
| /WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.html?1-10 (1/1, 100.00%, 0.01% of total) | TIMEOUT |
| undefined | TIMEOUT |
| /WebCryptoAPI/encrypt_decrypt/aes_gcm.https.worker.html (6/330, 1.82%, 0.06% of total) | OK |
| AES-GCM 128-bit key, illegal tag length 256-bits | FAIL |
| AES-GCM 128-bit key, illegal tag length 256-bits decryption | FAIL |
| AES-GCM 192-bit key, illegal tag length 256-bits | FAIL |
| AES-GCM 192-bit key, illegal tag length 256-bits decryption | FAIL |
| AES-GCM 256-bit key, illegal tag length 256-bits | FAIL |
| AES-GCM 256-bit key, illegal tag length 256-bits decryption | FAIL |