WebCryptoAPI: Complete Failures

Completely failed files: 54; Completely failed subtests: 307; Failure level: 307/10506 (2.92%)

Test Files

  1. /WebCryptoAPI/sign_verify/ecdsa.https.worker.html (56/168, 33.33%, 0.53% of total)
  2. /WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.worker.html (31/270, 11.48%, 0.30% of total)
  3. /WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.html?1-10 (1/1, 100.00%, 0.01% of total)
  4. /WebCryptoAPI/derive_bits_keys/hkdf.https.any.html?1-1000 (1/1, 100.00%, 0.01% of total)
  5. /WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.html?1-10 (1/1, 100.00%, 0.01% of total)
  6. /WebCryptoAPI/derive_bits_keys/ecdh_keys.https.any.html (1/1, 100.00%, 0.01% of total)
  7. /WebCryptoAPI/secure_context/crypto-subtle-non-secure-context-not-available.sub.html (2/2, 100.00%, 0.02% of total)
  8. /WebCryptoAPI/encrypt_decrypt/test_aes_gcm.https.html (6/330, 1.82%, 0.06% of total)
  9. /WebCryptoAPI/import_export/ec_importKey.https.worker.html (24/72, 33.33%, 0.23% of total)
  10. /WebCryptoAPI/sign_verify/test_ecdsa.https.html (56/168, 33.33%, 0.53% of total)
  11. /WebCryptoAPI/generateKey/failures_ECDSA.https.any.html (2/418, 0.48%, 0.02% of total)
  12. /WebCryptoAPI/derive_bits_keys/ecdh_bits.https.any.html (1/1, 100.00%, 0.01% of total)
  13. /WebCryptoAPI/generateKey/failures_ECDH.https.any.html (2/440, 0.45%, 0.02% of total)
  14. /WebCryptoAPI/wrapKey_unwrapKey/test_wrapKey_unwrapKey.https.html (31/270, 11.48%, 0.30% of total)
  15. /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?1-1000 (1/1, 100.00%, 0.01% of total)
  16. /WebCryptoAPI/generateKey/successes_ECDSA.https.any.html (18/54, 33.33%, 0.17% of total)
  17. /WebCryptoAPI/import_export/test_ec_importKey.https.html (24/72, 33.33%, 0.23% of total)
  18. /WebCryptoAPI/generateKey/successes_ECDH.https.any.html (24/72, 33.33%, 0.23% of total)
  19. /WebCryptoAPI/encrypt_decrypt/aes_cbc.https.worker.html (9/42, 21.43%, 0.09% of total)
  20. /WebCryptoAPI/encrypt_decrypt/test_aes_cbc.https.html (9/42, 21.43%, 0.09% of total)
  21. /WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.html?1-10 (1/1, 100.00%, 0.01% of total)
  22. /WebCryptoAPI/encrypt_decrypt/aes_gcm.https.worker.html (6/330, 1.82%, 0.06% of total)
Test Show/Hide MessagesSf12
/WebCryptoAPI/sign_verify/ecdsa.https.worker.html (56/168, 33.33%, 0.53% of total)OK
importVectorKeys step: ECDSA P-521 with SHA-1 no verify usageFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 round tripFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 signing with wrong algorithm nameFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 using privateKey to verifyFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 using publicKey to signFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 verificationFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered plaintextFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered signatureFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to bad hash nameFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to shortened signatureFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to wrong hashFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 verification with altered signature after callFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 verifying with wrong algorithm nameFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 with altered plaintext after callFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 no verify usageFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 round tripFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 signing with wrong algorithm nameFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 using privateKey to verifyFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 using publicKey to signFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 verificationFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered plaintextFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered signatureFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to bad hash nameFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to shortened signatureFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to wrong hashFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 verification with altered signature after callFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 verifying with wrong algorithm nameFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 with altered plaintext after callFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 no verify usageFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 round tripFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 signing with wrong algorithm nameFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 using privateKey to verifyFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 using publicKey to signFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 verificationFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered plaintextFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered signatureFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to bad hash nameFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to shortened signatureFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to wrong hashFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 verification with altered signature after callFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 verifying with wrong algorithm nameFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 with altered plaintext after callFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 no verify usageFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 round tripFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 signing with wrong algorithm nameFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 using privateKey to verifyFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 using publicKey to signFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 verificationFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered plaintextFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered signatureFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to bad hash nameFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to shortened signatureFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to wrong hashFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 verification with altered signature after callFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 verifying with wrong algorithm nameFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 with altered plaintext after callFAIL
/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.worker.html (31/270, 11.48%, 0.30% of total)OK
Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-KWFAIL
Can wrap and unwrap AES-CBC keys using jwk and AES-KWFAIL
Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-KWFAIL
Can wrap and unwrap AES-CTR keys using jwk and AES-KWFAIL
Can wrap and unwrap AES-GCM keys as non-extractable using jwk and AES-KWFAIL
Can wrap and unwrap AES-GCM keys using jwk and AES-KWFAIL
Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-KWFAIL
Can wrap and unwrap AES-KW keys using jwk and AES-KWFAIL
Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-KWFAIL
Can wrap and unwrap ECDH private key keys using jwk and AES-KWFAIL
Can wrap and unwrap ECDH public key keys using jwk and AES-KWFAIL
Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-KWFAIL
Can wrap and unwrap ECDSA private key keys using jwk and AES-KWFAIL
Can wrap and unwrap ECDSA public key keys using jwk and AES-KWFAIL
Can wrap and unwrap HMAC keys as non-extractable using jwk and AES-KWFAIL
Can wrap and unwrap HMAC keys using jwk and AES-KWFAIL
Can wrap and unwrap RSA-OAEP private key keys as non-extractable using jwk and AES-KWFAIL
Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-CBCFAIL
Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-CTRFAIL
Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-GCMFAIL
Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-KWFAIL
Can wrap and unwrap RSA-PSS private key keys as non-extractable using jwk and AES-KWFAIL
Can wrap and unwrap RSA-PSS private key keys using jwk and AES-CBCFAIL
Can wrap and unwrap RSA-PSS private key keys using jwk and AES-CTRFAIL
Can wrap and unwrap RSA-PSS private key keys using jwk and AES-GCMFAIL
Can wrap and unwrap RSA-PSS private key keys using jwk and AES-KWFAIL
Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using jwk and AES-KWFAIL
Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-CBCFAIL
Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-CTRFAIL
Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-GCMFAIL
Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-KWFAIL
/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.html?1-10 (1/1, 100.00%, 0.01% of total)TIMEOUT
undefinedTIMEOUT
/WebCryptoAPI/derive_bits_keys/hkdf.https.any.html?1-1000 (1/1, 100.00%, 0.01% of total)TIMEOUT
undefinedTIMEOUT
/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.html?1-10 (1/1, 100.00%, 0.01% of total)TIMEOUT
undefinedTIMEOUT
/WebCryptoAPI/derive_bits_keys/ecdh_keys.https.any.html (1/1, 100.00%, 0.01% of total)OK
WebCryptoAPI: deriveKey() Using ECDHFAIL
/WebCryptoAPI/secure_context/crypto-subtle-non-secure-context-not-available.sub.html (2/2, 100.00%, 0.02% of total)OK
Non-secure context window does not have access to crypto.subtleFAIL
Non-secure context worker does not have access to crypto.subtleFAIL
/WebCryptoAPI/encrypt_decrypt/test_aes_gcm.https.html (6/330, 1.82%, 0.06% of total)OK
AES-GCM 128-bit key, illegal tag length 256-bitsFAIL
AES-GCM 128-bit key, illegal tag length 256-bits decryptionFAIL
AES-GCM 192-bit key, illegal tag length 256-bitsFAIL
AES-GCM 192-bit key, illegal tag length 256-bits decryptionFAIL
AES-GCM 256-bit key, illegal tag length 256-bitsFAIL
AES-GCM 256-bit key, illegal tag length 256-bits decryptionFAIL
/WebCryptoAPI/import_export/ec_importKey.https.worker.html (24/72, 33.33%, 0.23% of total)OK
Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-521}, false, [])FAIL
Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-521}, true, [])FAIL
Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-521}, false, [])FAIL
Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-521}, true, [])FAIL
Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey])FAIL
Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveBits])FAIL
Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveKey])FAIL
Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey])FAIL
Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveBits])FAIL
Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveKey])FAIL
Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, false, [sign])FAIL
Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, true, [sign])FAIL
Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey])FAIL
Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits])FAIL
Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveKey])FAIL
Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey])FAIL
Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits])FAIL
Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveKey])FAIL
Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, false, [sign])FAIL
Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, true, [sign])FAIL
Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, false, [])FAIL
Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, true, [])FAIL
Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, false, [])FAIL
Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, true, [])FAIL
/WebCryptoAPI/sign_verify/test_ecdsa.https.html (56/168, 33.33%, 0.53% of total)OK
importVectorKeys step: ECDSA P-521 with SHA-1 no verify usageFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 round tripFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 signing with wrong algorithm nameFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 using privateKey to verifyFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 using publicKey to signFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 verificationFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered plaintextFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered signatureFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to bad hash nameFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to shortened signatureFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to wrong hashFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 verification with altered signature after callFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 verifying with wrong algorithm nameFAIL
importVectorKeys step: ECDSA P-521 with SHA-1 with altered plaintext after callFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 no verify usageFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 round tripFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 signing with wrong algorithm nameFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 using privateKey to verifyFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 using publicKey to signFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 verificationFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered plaintextFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered signatureFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to bad hash nameFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to shortened signatureFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to wrong hashFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 verification with altered signature after callFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 verifying with wrong algorithm nameFAIL
importVectorKeys step: ECDSA P-521 with SHA-256 with altered plaintext after callFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 no verify usageFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 round tripFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 signing with wrong algorithm nameFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 using privateKey to verifyFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 using publicKey to signFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 verificationFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered plaintextFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered signatureFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to bad hash nameFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to shortened signatureFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to wrong hashFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 verification with altered signature after callFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 verifying with wrong algorithm nameFAIL
importVectorKeys step: ECDSA P-521 with SHA-384 with altered plaintext after callFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 no verify usageFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 round tripFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 signing with wrong algorithm nameFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 using privateKey to verifyFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 using publicKey to signFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 verificationFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered plaintextFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered signatureFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to bad hash nameFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to shortened signatureFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to wrong hashFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 verification with altered signature after callFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 verifying with wrong algorithm nameFAIL
importVectorKeys step: ECDSA P-521 with SHA-512 with altered plaintext after callFAIL
/WebCryptoAPI/generateKey/failures_ECDSA.https.any.html (2/418, 0.48%, 0.02% of total)OK
Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, false, [])FAIL
Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [])FAIL
/WebCryptoAPI/derive_bits_keys/ecdh_bits.https.any.html (1/1, 100.00%, 0.01% of total)OK
WebCryptoAPI: deriveBits() Using ECDHFAIL
/WebCryptoAPI/generateKey/failures_ECDH.https.any.html (2/440, 0.45%, 0.02% of total)OK
Empty usages: generateKey({name: ECDH, namedCurve: P-521}, false, [])FAIL
Empty usages: generateKey({name: ECDH, namedCurve: P-521}, true, [])FAIL
/WebCryptoAPI/wrapKey_unwrapKey/test_wrapKey_unwrapKey.https.html (31/270, 11.48%, 0.30% of total)OK
Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-KWFAIL
Can wrap and unwrap AES-CBC keys using jwk and AES-KWFAIL
Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-KWFAIL
Can wrap and unwrap AES-CTR keys using jwk and AES-KWFAIL
Can wrap and unwrap AES-GCM keys as non-extractable using jwk and AES-KWFAIL
Can wrap and unwrap AES-GCM keys using jwk and AES-KWFAIL
Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-KWFAIL
Can wrap and unwrap AES-KW keys using jwk and AES-KWFAIL
Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-KWFAIL
Can wrap and unwrap ECDH private key keys using jwk and AES-KWFAIL
Can wrap and unwrap ECDH public key keys using jwk and AES-KWFAIL
Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-KWFAIL
Can wrap and unwrap ECDSA private key keys using jwk and AES-KWFAIL
Can wrap and unwrap ECDSA public key keys using jwk and AES-KWFAIL
Can wrap and unwrap HMAC keys as non-extractable using jwk and AES-KWFAIL
Can wrap and unwrap HMAC keys using jwk and AES-KWFAIL
Can wrap and unwrap RSA-OAEP private key keys as non-extractable using jwk and AES-KWFAIL
Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-CBCFAIL
Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-CTRFAIL
Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-GCMFAIL
Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-KWFAIL
Can wrap and unwrap RSA-PSS private key keys as non-extractable using jwk and AES-KWFAIL
Can wrap and unwrap RSA-PSS private key keys using jwk and AES-CBCFAIL
Can wrap and unwrap RSA-PSS private key keys using jwk and AES-CTRFAIL
Can wrap and unwrap RSA-PSS private key keys using jwk and AES-GCMFAIL
Can wrap and unwrap RSA-PSS private key keys using jwk and AES-KWFAIL
Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using jwk and AES-KWFAIL
Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-CBCFAIL
Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-CTRFAIL
Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-GCMFAIL
Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-KWFAIL
/WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?1-1000 (1/1, 100.00%, 0.01% of total)TIMEOUT
undefinedTIMEOUT
/WebCryptoAPI/generateKey/successes_ECDSA.https.any.html (18/54, 33.33%, 0.17% of total)OK
Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign, verify, sign, sign, verify])FAIL
Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign])FAIL
Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [verify, sign])FAIL
Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify])FAIL
Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign])FAIL
Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign])FAIL
Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify])FAIL
Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign])FAIL
Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [verify, sign])FAIL
Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify])FAIL
Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign])FAIL
Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [verify, sign])FAIL
Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify])FAIL
Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign])FAIL
Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [verify, sign])FAIL
Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify])FAIL
Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign])FAIL
Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [verify, sign])FAIL
/WebCryptoAPI/import_export/test_ec_importKey.https.html (24/72, 33.33%, 0.23% of total)OK
Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-521}, false, [])FAIL
Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-521}, true, [])FAIL
Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-521}, false, [])FAIL
Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-521}, true, [])FAIL
Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey])FAIL
Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveBits])FAIL
Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveKey])FAIL
Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey])FAIL
Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveBits])FAIL
Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveKey])FAIL
Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, false, [sign])FAIL
Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, true, [sign])FAIL
Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey])FAIL
Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits])FAIL
Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveKey])FAIL
Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey])FAIL
Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits])FAIL
Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveKey])FAIL
Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, false, [sign])FAIL
Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, true, [sign])FAIL
Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, false, [])FAIL
Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, true, [])FAIL
Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, false, [])FAIL
Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, true, [])FAIL
/WebCryptoAPI/generateKey/successes_ECDH.https.any.html (24/72, 33.33%, 0.23% of total)OK
Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey])FAIL
Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits])FAIL
Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])FAIL
Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey])FAIL
Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey])FAIL
Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits])FAIL
Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])FAIL
Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey])FAIL
Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey])FAIL
Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits])FAIL
Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])FAIL
Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey])FAIL
Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey])FAIL
Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits])FAIL
Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])FAIL
Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey])FAIL
Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey])FAIL
Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits])FAIL
Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])FAIL
Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey])FAIL
Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey])FAIL
Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits])FAIL
Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])FAIL
Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey])FAIL
/WebCryptoAPI/encrypt_decrypt/aes_cbc.https.worker.html (9/42, 21.43%, 0.09% of total)OK
AES-CBC 128-bit key, bigPadCharFAIL
AES-CBC 128-bit key, inconsistentPadCharsFAIL
AES-CBC 128-bit key, zeroPadCharFAIL
AES-CBC 192-bit key, bigPadCharFAIL
AES-CBC 192-bit key, inconsistentPadCharsFAIL
AES-CBC 192-bit key, zeroPadCharFAIL
AES-CBC 256-bit key, bigPadCharFAIL
AES-CBC 256-bit key, inconsistentPadCharsFAIL
AES-CBC 256-bit key, zeroPadCharFAIL
/WebCryptoAPI/encrypt_decrypt/test_aes_cbc.https.html (9/42, 21.43%, 0.09% of total)OK
AES-CBC 128-bit key, bigPadCharFAIL
AES-CBC 128-bit key, inconsistentPadCharsFAIL
AES-CBC 128-bit key, zeroPadCharFAIL
AES-CBC 192-bit key, bigPadCharFAIL
AES-CBC 192-bit key, inconsistentPadCharsFAIL
AES-CBC 192-bit key, zeroPadCharFAIL
AES-CBC 256-bit key, bigPadCharFAIL
AES-CBC 256-bit key, inconsistentPadCharsFAIL
AES-CBC 256-bit key, zeroPadCharFAIL
/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.html?1-10 (1/1, 100.00%, 0.01% of total)TIMEOUT
undefinedTIMEOUT
/WebCryptoAPI/encrypt_decrypt/aes_gcm.https.worker.html (6/330, 1.82%, 0.06% of total)OK
AES-GCM 128-bit key, illegal tag length 256-bitsFAIL
AES-GCM 128-bit key, illegal tag length 256-bits decryptionFAIL
AES-GCM 192-bit key, illegal tag length 256-bitsFAIL
AES-GCM 192-bit key, illegal tag length 256-bits decryptionFAIL
AES-GCM 256-bit key, illegal tag length 256-bitsFAIL
AES-GCM 256-bit key, illegal tag length 256-bits decryptionFAIL